Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2009-2625
Vulnerability from cvelistv5
Published
2009-08-06 15:00
Modified
2024-08-07 05:59
Severity ?
EPSS score ?
Summary
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T05:59:56.314Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "SSA:2011-041-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE", "x_transferred" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.486026" }, { "name": "RHSA-2009:1200", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" }, { "name": "RHSA-2009:1199", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.networkworld.com/columnists/2009/080509-xml-flaw.html" }, { "name": "USN-890-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-890-1" }, { "name": "36162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36162" }, { "name": "ADV-2009-2543", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "name": "DSA-1984", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2010/dsa-1984" }, { "name": "[oss-security] 20091022 Re: Regarding expat bug 1990430", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2009/10/22/9" }, { "name": "1021506", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1" }, { "name": "37460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37460" }, { "name": "RHSA-2009:1615", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1615.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "HPSBUX02476", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2" }, { "name": "37754", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37754" }, { "name": "RHSA-2009:1637", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1637.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.cert.fi/en/reports/2009/vulnerability2009085.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.codenomicon.com/labs/xml/" }, { "name": "36199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36199" }, { "name": "RHSA-2012:1537", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1537.html" }, { "name": "SUSE-SR:2010:013", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" }, { "name": "MDVSA-2009:209", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" }, { "name": "FEDORA-2009-8329", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" }, { "name": "RHSA-2011:0858", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0858.html" }, { "name": "SSRT090250", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2" }, { "name": "1022680", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1022680" }, { "name": "37671", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37671" }, { "name": "38342", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38342" }, { "name": "RHSA-2009:1636", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1636.html" }, { "name": "35958", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/35958" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "RHSA-2009:1649", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1649.html" }, { "name": "[oss-security] 20091026 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2009/10/26/3" }, { "name": "TA09-294A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html" }, { "name": "50549", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/50549" }, { "name": "oval:org.mitre.oval:def:8520", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520" }, { "name": "36180", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36180" }, { "name": "38231", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/38231" }, { "name": "272209", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1" }, { "name": "MDVSA-2011:108", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:108" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1" }, { "name": "36176", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/36176" }, { "name": "FEDORA-2009-8337", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" }, { "name": "43300", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43300" }, { "name": "oval:org.mitre.oval:def:9356", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356" }, { "name": "TA10-012A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-012A.html" }, { "name": "SUSE-SR:2009:016", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "name": "RHSA-2012:1232", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1232.html" }, { "name": "263489", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055\u0026r2=787352\u0026pathrev=787353\u0026diff_format=h" }, { "name": "37300", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/37300" }, { "name": "APPLE-SA-2009-09-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE", "x_transferred" ], "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "name": "SUSE-SA:2009:053", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "name": "RHSA-2009:1201", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html" }, { "name": "SUSE-SR:2009:017", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" }, { "name": "[oss-security] 20090906 Re: Re: expat bug 1990430", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2009/09/06/1" }, { "name": "[oss-security] 20091023 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2009/10/23/6" }, { "name": "ADV-2011-0359", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0359" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "name": "RHSA-2009:1650", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1650.html" }, { "name": "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-08-05T00:00:00", "descriptions": [ { "lang": "en", "value": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-20T16:06:10", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "name": "SSA:2011-041-02", "tags": [ "vendor-advisory", "x_refsource_SLACKWARE" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.486026" }, { "name": "RHSA-2009:1200", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" }, { "name": "RHSA-2009:1199", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.networkworld.com/columnists/2009/080509-xml-flaw.html" }, { "name": "USN-890-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-890-1" }, { "name": "36162", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36162" }, { "name": "ADV-2009-2543", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "name": "DSA-1984", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2010/dsa-1984" }, { "name": "[oss-security] 20091022 Re: Regarding expat bug 1990430", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2009/10/22/9" }, { "name": "1021506", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1" }, { "name": "37460", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37460" }, { "name": "RHSA-2009:1615", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1615.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "HPSBUX02476", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2" }, { "name": "37754", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37754" }, { "name": "RHSA-2009:1637", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1637.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.cert.fi/en/reports/2009/vulnerability2009085.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.codenomicon.com/labs/xml/" }, { "name": "36199", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36199" }, { "name": "RHSA-2012:1537", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1537.html" }, { "name": "SUSE-SR:2010:013", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" }, { "name": "MDVSA-2009:209", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" }, { "name": "FEDORA-2009-8329", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" }, { "name": "RHSA-2011:0858", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0858.html" }, { "name": "SSRT090250", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2" }, { "name": "1022680", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1022680" }, { "name": "37671", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37671" }, { "name": "38342", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38342" }, { "name": "RHSA-2009:1636", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1636.html" }, { "name": "35958", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/35958" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "RHSA-2009:1649", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1649.html" }, { "name": "[oss-security] 20091026 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2009/10/26/3" }, { "name": "TA09-294A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html" }, { "name": "50549", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/50549" }, { "name": "oval:org.mitre.oval:def:8520", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520" }, { "name": "36180", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36180" }, { "name": "38231", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/38231" }, { "name": "272209", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1" }, { "name": "MDVSA-2011:108", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:108" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1" }, { "name": "36176", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/36176" }, { "name": "FEDORA-2009-8337", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" }, { "name": "43300", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43300" }, { "name": "oval:org.mitre.oval:def:9356", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356" }, { "name": "TA10-012A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-012A.html" }, { "name": "SUSE-SR:2009:016", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "name": "RHSA-2012:1232", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1232.html" }, { "name": "263489", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055\u0026r2=787352\u0026pathrev=787353\u0026diff_format=h" }, { "name": "37300", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/37300" }, { "name": "APPLE-SA-2009-09-03-1", "tags": [ "vendor-advisory", "x_refsource_APPLE" ], "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "name": "SUSE-SA:2009:053", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "name": "RHSA-2009:1201", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html" }, { "name": "SUSE-SR:2009:017", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" }, { "name": "[oss-security] 20090906 Re: Re: expat bug 1990430", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2009/09/06/1" }, { "name": "[oss-security] 20091023 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2009/10/23/6" }, { "name": "ADV-2011-0359", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0359" }, { "name": "ADV-2009-3316", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "name": "RHSA-2009:1650", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1650.html" }, { "name": "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2009-2625", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SSA:2011-041-02", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.486026" }, { "name": "RHSA-2009:1200", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" }, { "name": "RHSA-2009:1199", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html" }, { "name": "http://www.networkworld.com/columnists/2009/080509-xml-flaw.html", "refsource": "MISC", "url": "http://www.networkworld.com/columnists/2009/080509-xml-flaw.html" }, { "name": "USN-890-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-890-1" }, { "name": "36162", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36162" }, { "name": "ADV-2009-2543", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "name": "DSA-1984", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2010/dsa-1984" }, { "name": "[oss-security] 20091022 Re: Regarding expat bug 1990430", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/10/22/9" }, { "name": "1021506", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1" }, { "name": "37460", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37460" }, { "name": "RHSA-2009:1615", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1615.html" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "HPSBUX02476", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2" }, { "name": "37754", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37754" }, { "name": "RHSA-2009:1637", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2009-1637.html" }, { "name": "http://www.cert.fi/en/reports/2009/vulnerability2009085.html", "refsource": "MISC", "url": "http://www.cert.fi/en/reports/2009/vulnerability2009085.html" }, { "name": "http://www.codenomicon.com/labs/xml/", "refsource": "MISC", "url": "http://www.codenomicon.com/labs/xml/" }, { "name": "36199", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36199" }, { "name": "RHSA-2012:1537", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-1537.html" }, { "name": "SUSE-SR:2010:013", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" }, { "name": "MDVSA-2009:209", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" }, { "name": "FEDORA-2009-8329", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" }, { "name": "RHSA-2011:0858", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0858.html" }, { "name": "SSRT090250", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2" }, { "name": "1022680", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022680" }, { "name": "37671", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37671" }, { "name": "38342", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38342" }, { "name": "RHSA-2009:1636", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2009-1636.html" }, { "name": "35958", "refsource": "BID", "url": "http://www.securityfocus.com/bid/35958" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "RHSA-2009:1649", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2009-1649.html" }, { "name": "[oss-security] 20091026 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/10/26/3" }, { "name": "TA09-294A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html" }, { "name": "50549", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/50549" }, { "name": "oval:org.mitre.oval:def:8520", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520" }, { "name": "36180", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36180" }, { "name": "38231", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38231" }, { "name": "272209", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1" }, { "name": "MDVSA-2011:108", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:108" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1", "refsource": "CONFIRM", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1" }, { "name": "36176", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36176" }, { "name": "FEDORA-2009-8337", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" }, { "name": "43300", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43300" }, { "name": "oval:org.mitre.oval:def:9356", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356" }, { "name": "TA10-012A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA10-012A.html" }, { "name": "SUSE-SR:2009:016", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "name": "RHSA-2012:1232", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-1232.html" }, { "name": "263489", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1" }, { "name": "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055\u0026r2=787352\u0026pathrev=787353\u0026diff_format=h", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055\u0026r2=787352\u0026pathrev=787353\u0026diff_format=h" }, { "name": "37300", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37300" }, { "name": "APPLE-SA-2009-09-03-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "name": "SUSE-SA:2009:053", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=512921", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "name": "RHSA-2009:1201", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html" }, { "name": "SUSE-SR:2009:017", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" }, { "name": "[oss-security] 20090906 Re: Re: expat bug 1990430", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/09/06/1" }, { "name": "[oss-security] 20091023 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/10/23/6" }, { "name": "ADV-2011-0359", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0359" }, { "name": "ADV-2009-3316", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "name": "RHSA-2009:1650", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2009-1650.html" }, { "name": "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2009-2625", "datePublished": "2009-08-06T15:00:00", "dateReserved": "2009-07-28T00:00:00", "dateUpdated": "2024-08-07T05:59:56.314Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2009-2625\",\"sourceIdentifier\":\"cret@cert.org\",\"published\":\"2009-08-06T15:30:00.327\",\"lastModified\":\"2024-11-21T01:05:19.423\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.\"},{\"lang\":\"es\",\"value\":\"Apache Xerces2 Java, tal como se utiliza en Sun Java Runtime Environment (JRE) en JDK y JRE v6 anterior a la actualizaci\u00f3n 15 y el JDK y JRE v5.0 antes de la actualizaci\u00f3n 20, y en otros productos, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (bucle infinito y la cuelgue de aplicaci\u00f3n) a trav\u00e9s de una entrada XML malformada, como lo demuestra Codenomicon XML fuzzing framework.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.5.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"711BCDB5-83BC-4DBA-8097-2CD33617FD19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.5.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5F20B3E-781F-4DC1-B939-B0EAFC515F71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.5.0:update10:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEB37E93-38EB-4AEE-A3DD-D2097C0D6852\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.5.0:update11:*:*:*:*:*:*\",\"matchCriteriaId\":\"59DED85A-153E-40B1-9ABA-D405204E464E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.5.0:update12:*:*:*:*:*:*\",\"matchCriteriaId\":\"168E67FC-32BC-4DAE-B49C-840FD721D7AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.5.0:update13:*:*:*:*:*:*\",\"matchCriteriaId\":\"83A2B4A2-ED27-4C12-871B-C0F78C3478FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.5.0:update14:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E8A5D2D-B620-449B-B599-51F5C9FC658C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.5.0:update15:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A39B469-5041-4715-B6AC-36D8777677EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.5.0:update16:*:*:*:*:*:*\",\"matchCriteriaId\":\"F49DBD1F-D3F5-400B-AE2E-BC87B05A5051\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.5.0:update17:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E605982-97A2-4E5E-847E-2BB8AD77910C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.5.0:update18:*:*:*:*:*:*\",\"matchCriteriaId\":\"848299EC-DE52-4511-BF53-C83022935964\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.5.0:update19:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD5BD598-ADBC-42EE-BF81-049D89CCA426\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.5.0:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"64AC19E5-A20C-4D51-B465-ABCDBADF550A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.5.0:update3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2CCCA1A-F0A1-4511-AF84-326DF406C0DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.5.0:update4:*:*:*:*:*:*\",\"matchCriteriaId\":\"81B0BEF9-25FD-48F7-83BC-BEA31BC3A1BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.5.0:update5:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E6D8590-0A99-43E0-9256-9572112F9C8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.5.0:update6:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F2A0870-A4D3-481B-8A37-A4DC282B0DE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.5.0:update7:*:*:*:*:*:*\",\"matchCriteriaId\":\"20171515-B5A5-44D2-B7F7-21EDDE39989E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.5.0:update8:*:*:*:*:*:*\",\"matchCriteriaId\":\"F734AF76-4CEE-4F9D-AD6A-6BECF1F977CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.5.0:update9:*:*:*:*:*:*\",\"matchCriteriaId\":\"985B45F6-C285-4061-A656-A4C1A1FE59D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A420DA5-1346-446B-8D23-E1E6DDBE527E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8CA8719-7ABE-4279-B49E-C414794A4FE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update10:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC92B7EC-849F-4255-9D55-43681B8DADC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update11:*:*:*:*:*:*\",\"matchCriteriaId\":\"2ABC1045-7D3D-4A14-B994-7E60A4BB4C9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update12:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F3C1E65-929A-4468-8584-F086E6E59839\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update13:*:*:*:*:*:*\",\"matchCriteriaId\":\"42C95C1D-0C2E-4733-AB1B-65650D88995D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update14:*:*:*:*:*:*\",\"matchCriteriaId\":\"47A9F499-D1E3-41BD-AC18-E8D3D3231C12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6E07069-D6EE-4D44-94A6-CDCA4A50E6F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update3:*:*:*:*:*:*\",\"matchCriteriaId\":\"344FA3EA-9E25-493C-976A-211D1404B251\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update4:*:*:*:*:*:*\",\"matchCriteriaId\":\"D081A380-5AA4-4451-94A9-7B65810106E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update5:*:*:*:*:*:*\",\"matchCriteriaId\":\"112E7575-A3A0-4A94-AD39-7B2325B150B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update6:*:*:*:*:*:*\",\"matchCriteriaId\":\"708E8CEF-82EE-4D4B-ABF9-87AA4878F517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:jdk:1.6.0:update7:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5D9D9A7-8819-44A4-80AC-52D6B63A0C9B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7000D33B-F3C7-43E8-8FC7-9B97AADC3E12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3BB5EDB-520B-4DEF-B06E-65CA13152824\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B42AB65-443B-4655-BAEA-4EB4A43D9509\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBF7B6A8-3DF9-46EC-A90E-6EF68C39F883\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A01C8B7E-EB19-40EA-B1D2-9AE5EA536C95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD2D897-E321-4CED-92E0-11A98B52053C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*\",\"matchCriteriaId\":\"22A79A35-05DB-4B9F-AD3E-EA6F933CF10C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*\",\"matchCriteriaId\":\"79A35457-EAA3-4BF9-A4DA-B2E414A75A02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"F13F07CC-739B-465C-9184-0E9D708BD4C7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F92AB32-E7DE-43F4-B877-1F41FA162EC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C757774-08E7-40AA-B532-6F705C8F7639\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"454A5D17-B171-4F1F-9E0B-F18D1E5CA9FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"7EBFE35C-E243-43D1-883D-4398D71763CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4747CC68-FAF4-482F-929A-9DA6C24CB663\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5D026D0-EF78-438D-BEDD-FC8571F3ACEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2BCB73E-27BB-4878-AD9C-90C4F20C25A0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F920C50-FE0F-4915-965A-AA58884DF7A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:6.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"944FDBF2-1262-4B85-A7D3-537330144D22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57C2F58F-13AA-45C5-9172-8465B44CA9FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:primavera_web_services:6.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A3115EB-0671-4E0C-9B75-FACFD6D42B88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:primavera_web_services:7.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3376F25-51D0-4D84-AFC7-AD1C1BCA0191\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:oracle:primavera_web_services:7.0:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDE00C3E-BB4E-4E71-86B8-E637BCD033A7\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:xerces2_java:2.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC3C1085-3255-449C-AFE3-984EFAC5BCCE\"}]}]}],\"references\":[{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1232.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1537.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/36162\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/36176\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/36180\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/36199\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/37300\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/37460\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/37671\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/37754\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/38231\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/38342\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/43300\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/50549\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.486026\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1\",\"source\":\"cret@cert.org\",\"tags\":[\"Broken Link\",\"Patch\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1\",\"source\":\"cret@cert.org\",\"tags\":[\"Broken Link\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1\",\"source\":\"cret@cert.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1\",\"source\":\"cret@cert.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055\u0026r2=787352\u0026pathrev=787353\u0026diff_format=h\",\"source\":\"cret@cert.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.cert.fi/en/reports/2009/vulnerability2009085.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.codenomicon.com/labs/xml/\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2010/dsa-1984\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:209\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:108\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.networkworld.com/columnists/2009/080509-xml-flaw.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/09/06/1\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/10/22/9\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/10/23/6\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/10/26/3\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1615.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0858.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/35958\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1022680\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-890-1\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-294A.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA10-012A.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2543\",\"source\":\"cret@cert.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"cret@cert.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0359\",\"source\":\"cret@cert.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=512921\",\"source\":\"cret@cert.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E\",\"source\":\"cret@cert.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356\",\"source\":\"cret@cert.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1199.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1200.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1201.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1636.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1637.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1649.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1650.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html\",\"source\":\"cret@cert.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1232.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2012-1537.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/36162\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/36176\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/36180\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/36199\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/37300\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/37460\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/37671\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/37754\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/38231\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/38342\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/43300\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/50549\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.486026\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Patch\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055\u0026r2=787352\u0026pathrev=787353\u0026diff_format=h\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.cert.fi/en/reports/2009/vulnerability2009085.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.codenomicon.com/labs/xml/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2010/dsa-1984\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2009:209\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:108\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.networkworld.com/columnists/2009/080509-xml-flaw.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/09/06/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/10/22/9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/10/23/6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.openwall.com/lists/oss-security/2009/10/26/3\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2009-1615.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0858.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/507985/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/35958\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id?1022680\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-890-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA09-294A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.us-cert.gov/cas/techalerts/TA10-012A.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2009-0016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/2543\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3316\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0359\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=512921\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5%40%3Csolr-user.lucene.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1199.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1200.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1201.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1636.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1637.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1649.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2009-1650.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]}]}}" } }
rhsa-2009_1636
Vulnerability from csaf_redhat
Published
2009-12-09 23:14
Modified
2024-12-15 18:16
Summary
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP07 update
Notes
Topic
Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix
multiple security issues, several bugs, and add enhancements are now
available for Red Hat Enterprise Linux 4 as JBEAP 4.3.0.CP07.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
JBoss Enterprise Application Platform is the market leading platform for
innovative and scalable Java applications; integrating the JBoss
Application Server, with JBoss Hibernate and JBoss Seam into a complete,
simple enterprise solution.
This release of JBEAP for Red Hat Enterprise Linux 4 serves as a
replacement to JBEAP 4.3.0.CP06.
These updated packages include bug fixes and enhancements which are
detailed in the Release Notes, available shortly from:
http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/
The following security issues are also fixed with this release:
A missing check for the recommended minimum length of the truncated form of
HMAC-based XML signatures was found in xml-security. An attacker could use
this flaw to create a specially-crafted XML file that forges an XML
signature, allowing the attacker to bypass authentication that is based on
the XML Signature specification. (CVE-2009-0217)
Swatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss
Application Server Web Console. An attacker could use these flaws to
present misleading data to an authenticated user, or execute arbitrary
scripting code in the context of the authenticated user's browser session.
(CVE-2009-2405)
A flaw was found in the way the Apache Xerces2 Java Parser processed the
SYSTEM identifier in DTDs. A remote attacker could provide a
specially-crafted XML file, which once parsed by an application using the
Apache Xerces2 Java Parser, would lead to a denial of service (application
hang due to excessive CPU use). (CVE-2009-2625)
An information leak flaw was found in the twiddle command line client. The
JMX password was logged in plain text to "twiddle.log". (CVE-2009-3554)
An XSS flaw was found in the JMX Console. An attacker could use this flaw
to present misleading data to an authenticated user, or execute arbitrary
scripting code in the context of the authenticated user's browser session.
(CVE-2009-1380)
Warning: Before applying this update, please backup the JBEAP
"server/[configuration]/deploy/" directory, and any other customized
configuration files.
All users of JBEAP 4.3 on Red Hat Enterprise Linux 4 are advised to upgrade
to these updated packages.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix\nmultiple security issues, several bugs, and add enhancements are now\navailable for Red Hat Enterprise Linux 4 as JBEAP 4.3.0.CP07.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 4 serves as a\nreplacement to JBEAP 4.3.0.CP06.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the Release Notes, available shortly from:\nhttp://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/\n\nThe following security issues are also fixed with this release:\n\nA missing check for the recommended minimum length of the truncated form of\nHMAC-based XML signatures was found in xml-security. An attacker could use\nthis flaw to create a specially-crafted XML file that forges an XML\nsignature, allowing the attacker to bypass authentication that is based on\nthe XML Signature specification. (CVE-2009-0217)\n\nSwatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss\nApplication Server Web Console. An attacker could use these flaws to\npresent misleading data to an authenticated user, or execute arbitrary\nscripting code in the context of the authenticated user\u0027s browser session.\n(CVE-2009-2405)\n\nA flaw was found in the way the Apache Xerces2 Java Parser processed the\nSYSTEM identifier in DTDs. A remote attacker could provide a\nspecially-crafted XML file, which once parsed by an application using the\nApache Xerces2 Java Parser, would lead to a denial of service (application\nhang due to excessive CPU use). (CVE-2009-2625)\n\nAn information leak flaw was found in the twiddle command line client. The\nJMX password was logged in plain text to \"twiddle.log\". (CVE-2009-3554)\n\nAn XSS flaw was found in the JMX Console. An attacker could use this flaw\nto present misleading data to an authenticated user, or execute arbitrary\nscripting code in the context of the authenticated user\u0027s browser session.\n(CVE-2009-1380)\n\nWarning: Before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.3 on Red Hat Enterprise Linux 4 are advised to upgrade\nto these updated packages.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1636", "url": "https://access.redhat.com/errata/RHSA-2009:1636" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/", "url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/" }, { "category": "external", "summary": "510023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510023" }, { "category": "external", "summary": "511224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511224" }, { "category": "external", "summary": "511915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915" }, { "category": "external", "summary": "512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "532117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=532117" }, { "category": "external", "summary": "539495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539495" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1636.json" } ], "title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP07 update", "tracking": { "current_release_date": "2024-12-15T18:16:17+00:00", "generator": { "date": "2024-12-15T18:16:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2009:1636", "initial_release_date": "2009-12-09T23:14:00+00:00", "revision_history": [ { "date": "2009-12-09T23:14:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-12-09T18:14:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-15T18:16:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "product": { "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "product_id": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-remoting@2.2.3-3.SP1.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "product": { "name": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "product_id": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1.12.patch03.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "product": { "name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "product_id": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossws-common@1.0.0-2.GA_CP05.1.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "product": { "name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "product_id": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-1.GA_CP05.1.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "product": { "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "product_id": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/quartz@1.5.2-1jpp.patch01.ep1.4.el4?arch=src" } } }, { "category": "product_version", "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "product": { "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "product_id": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-security@1.3.0-1.3.patch01.ep1.2.el4?arch=src" } } }, { "category": "product_version", "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "product": { "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "product_id": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-aop@1.5.5-3.CP04.2.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "product": { "name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "product_id": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2@2.7.1-9jpp.4.patch_02.1.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "jgroups-1:2.4.7-1.ep1.el4.src", "product": { "name": "jgroups-1:2.4.7-1.ep1.el4.src", "product_id": "jgroups-1:2.4.7-1.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jgroups@2.4.7-1.ep1.el4?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "product": { "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "product_id": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP09.0jpp.ep1.1.el4?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "product": { "name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "product_id": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations@3.3.1-1.11.GA_CP02.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "product": { "name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "product_id": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.3.2-2.5.GA_CP01.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "product": { "name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "product_id": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-3.SP3_CP09.4.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "product": { "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "product_id": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP12.0jpp.ep1.2.el4?arch=src" } } }, { "category": "product_version", "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "product": { "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "product_id": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.1.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "product": { "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "product_id": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common@1.2.1-0jpp.ep1.3.el4?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "product": { "name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "product_id": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-logging-jboss@1.1-9.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "product": { "name": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "product_id": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossws@2.0.1-4.SP2_CP07.2.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "jcommon-0:1.0.16-1.1.ep1.el4.src", "product": { "name": "jcommon-0:1.0.16-1.1.ep1.el4.src", "product_id": "jcommon-0:1.0.16-1.1.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jcommon@1.0.16-1.1.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "product": { "name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "product_id": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.1.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "product": { "name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "product_id": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jacorb@2.3.0-1jpp.ep1.9.el4?arch=src" } } }, { "category": "product_version", "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "product": { "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "product_id": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP08.1jpp.ep1.1.el4?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "product": { "name": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "product_id": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas@4.3.0-6.GA_CP07.4.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "product": { "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4?arch=src" } } }, { "category": "product_version", "name": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "product": { "name": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "product_id": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam2@2.0.2.FP-1.ep1.21.el4?arch=src" } } }, { "category": "product_version", "name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "product": { "name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "product_id": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-6.GA_CP07.ep1.3.el4?arch=src" } } }, { "category": "product_version", "name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "product": { "name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "product_id": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-javamail@1.4.2-0jpp.ep1.5.el4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "product": { "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "product_id": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-remoting@2.2.3-3.SP1.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "product": { "name": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "product_id": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1.12.patch03.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "product": { "name": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "product_id": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jaxb-javadoc@2.1.4-1.12.patch03.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "product": { "name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "product_id": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossws-common@1.0.0-2.GA_CP05.1.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "product": { "name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "product_id": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-1.GA_CP05.1.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "product": { "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "product_id": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/quartz@1.5.2-1jpp.patch01.ep1.4.el4?arch=noarch" } } }, { "category": "product_version", "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "product": { "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "product_id": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-security@1.3.0-1.3.patch01.ep1.2.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "product": { "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "product_id": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-aop@1.5.5-3.CP04.2.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "product": { "name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "product_id": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2@2.7.1-9jpp.4.patch_02.1.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jgroups-1:2.4.7-1.ep1.el4.noarch", "product": { "name": "jgroups-1:2.4.7-1.ep1.el4.noarch", "product_id": "jgroups-1:2.4.7-1.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jgroups@2.4.7-1.ep1.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "product": { "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "product_id": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP09.0jpp.ep1.1.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "product": { "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP09.0jpp.ep1.1.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "product": { "name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "product_id": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations@3.3.1-1.11.GA_CP02.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "product": { "name": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "product_id": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.3.1-1.11.GA_CP02.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "product": { "name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "product_id": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.3.2-2.5.GA_CP01.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "product": { "name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "product_id": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.3.2-2.5.GA_CP01.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "product": { "name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "product_id": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-3.SP3_CP09.4.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "product": { "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "product_id": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP12.0jpp.ep1.2.el4?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "product": { "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "product_id": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.1.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "product": { "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "product_id": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common@1.2.1-0jpp.ep1.3.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "product": { "name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "product_id": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-logging-jboss@1.1-9.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "product": { "name": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "product_id": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossws@2.0.1-4.SP2_CP07.2.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "product": { "name": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "product_id": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossws-native42@2.0.1-4.SP2_CP07.2.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jcommon-0:1.0.16-1.1.ep1.el4.noarch", "product": { "name": "jcommon-0:1.0.16-1.1.ep1.el4.noarch", "product_id": "jcommon-0:1.0.16-1.1.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jcommon@1.0.16-1.1.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "product": { "name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "product_id": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.1.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "product": { "name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "product_id": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jacorb@2.3.0-1jpp.ep1.9.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "product": { "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "product_id": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP08.1jpp.ep1.1.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "product": { "name": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "product_id": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas@4.3.0-6.GA_CP07.4.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "product": { "name": "jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "product_id": "jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-client@4.3.0-6.GA_CP07.4.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "product": { "name": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "product_id": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-4.3.0.GA_CP07-bin@4.3.0-6.GA_CP07.4.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "product": { "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "product": { "name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "product_id": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "product": { "name": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "product_id": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam2@2.0.2.FP-1.ep1.21.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "product": { "name": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "product_id": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam2-docs@2.0.2.FP-1.ep1.21.el4?arch=noarch" } } }, { "category": "product_version", "name": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "product": { "name": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "product_id": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-eap-docs-examples@4.3.0-6.GA_CP07.ep1.3.el4?arch=noarch" } } }, { "category": "product_version", "name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "product": { "name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "product_id": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-6.GA_CP07.ep1.3.el4?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "product": { "name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "product_id": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-javamail@1.4.2-0jpp.ep1.5.el4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch" }, "product_reference": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src" }, "product_reference": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch" }, "product_reference": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src" }, "product_reference": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch" }, "product_reference": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch" }, "product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src" }, "product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch" }, "product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src" }, "product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch" }, "product_reference": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src" }, "product_reference": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch" }, "product_reference": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch" }, "product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src" }, "product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch" }, "product_reference": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch" }, "product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch" }, "product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src" }, "product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch" }, "product_reference": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src" }, "product_reference": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch" }, "product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src" }, "product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch" }, "product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src" }, "product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch" }, "product_reference": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src" }, "product_reference": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch" }, "product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src" }, "product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch" }, "product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src" }, "product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch" }, "product_reference": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch" }, "product_reference": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src" }, "product_reference": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch" }, "product_reference": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch" }, "product_reference": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src" }, "product_reference": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch" }, "product_reference": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch" }, "product_reference": "jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch" }, "product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src" }, "product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch" }, "product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src" }, "product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch" }, "product_reference": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src" }, "product_reference": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch" }, "product_reference": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src" }, "product_reference": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch" }, "product_reference": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src" }, "product_reference": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch" }, "product_reference": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jcommon-0:1.0.16-1.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch" }, "product_reference": "jcommon-0:1.0.16-1.1.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jcommon-0:1.0.16-1.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src" }, "product_reference": "jcommon-0:1.0.16-1.1.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch" }, "product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src" }, "product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jgroups-1:2.4.7-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch" }, "product_reference": "jgroups-1:2.4.7-1.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jgroups-1:2.4.7-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src" }, "product_reference": "jgroups-1:2.4.7-1.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch" }, "product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src" }, "product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch" }, "product_reference": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src" }, "product_reference": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch" }, "product_reference": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch" }, "product_reference": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src" }, "product_reference": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch" }, "product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" }, "product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch" }, "product_reference": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src" }, "product_reference": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch" }, "product_reference": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src" }, "product_reference": "glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch" }, "product_reference": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch" }, "product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src" }, "product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch" }, "product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src" }, "product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch" }, "product_reference": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src" }, "product_reference": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch" }, "product_reference": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch" }, "product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src" }, "product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch" }, "product_reference": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch" }, "product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch" }, "product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src" }, "product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch" }, "product_reference": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src" }, "product_reference": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch" }, "product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src" }, "product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch" }, "product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src" }, "product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch" }, "product_reference": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src" }, "product_reference": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch" }, "product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src" }, "product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch" }, "product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src" }, "product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch" }, "product_reference": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch" }, "product_reference": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src" }, "product_reference": "jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch" }, "product_reference": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch" }, "product_reference": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src" }, "product_reference": "jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch" }, "product_reference": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch" }, "product_reference": "jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch" }, "product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src" }, "product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch" }, "product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src" }, "product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch" }, "product_reference": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src" }, "product_reference": "jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch" }, "product_reference": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src" }, "product_reference": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch" }, "product_reference": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src" }, "product_reference": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch" }, "product_reference": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jcommon-0:1.0.16-1.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch" }, "product_reference": "jcommon-0:1.0.16-1.1.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jcommon-0:1.0.16-1.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src" }, "product_reference": "jcommon-0:1.0.16-1.1.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch" }, "product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src" }, "product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jgroups-1:2.4.7-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch" }, "product_reference": "jgroups-1:2.4.7-1.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jgroups-1:2.4.7-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src" }, "product_reference": "jgroups-1:2.4.7-1.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch" }, "product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src" }, "product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch" }, "product_reference": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src" }, "product_reference": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch" }, "product_reference": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch" }, "product_reference": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src" }, "product_reference": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch" }, "product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" }, "product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0217", "discovery_date": "2009-07-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "511915" } ], "notes": [ { "category": "description", "text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0217" }, { "category": "external", "summary": "RHBZ#511915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0217" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217" } ], "release_date": "2009-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-09T23:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1636" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass" }, { "cve": "CVE-2009-1380", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2009-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "511224" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in JMX-Console in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 allows remote attackers to inject arbitrary web script or HTML via the filter parameter, related to the key property and the position of quote and colon characters.", "title": "Vulnerability description" }, { "category": "summary", "text": "jbossas JMX-Console cross-site-scripting in filter parameter", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1380" }, { "category": "external", "summary": "RHBZ#511224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511224" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1380", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1380" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1380", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1380" } ], "release_date": "2009-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-09T23:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1636" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jbossas JMX-Console cross-site-scripting in filter parameter" }, { "cve": "CVE-2009-2405", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2009-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "510023" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) vulnerabilities in the Web Console in the Application Server in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2.0 before 4.2.0.CP08, 4.2.2GA, 4.3 before 4.3.0.CP07, and 5.1.0GA allow remote attackers to inject arbitrary web script or HTML via the (1) monitorName, (2) objectName, (3) attribute, or (4) period parameter to createSnapshot.jsp, or the (5) monitorName, (6) objectName, (7) attribute, (8) threshold, (9) period, or (10) enabled parameter to createThresholdMonitor.jsp. NOTE: some of these details are obtained from third party information.", "title": "Vulnerability description" }, { "category": "summary", "text": "JBoss Application Server Web Console XSS", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw does not affect Red Hat JBoss Enterprise Application Platform 5 or 6. Older versions of the community JBoss Application Server 5.x may be affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2405" }, { "category": "external", "summary": "RHBZ#510023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2405", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2405" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2405", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2405" } ], "release_date": "2009-07-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-09T23:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1636" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JBoss Application Server Web Console XSS" }, { "cve": "CVE-2009-2625", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512921" } ], "notes": [ { "category": "description", "text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: XML parsing Denial-Of-Service (6845701)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2625" }, { "category": "external", "summary": "RHBZ#512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-09T23:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1636" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: XML parsing Denial-Of-Service (6845701)" }, { "cve": "CVE-2009-3554", "discovery_date": "2009-10-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "539495" } ], "notes": [ { "category": "description", "text": "Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.", "title": "Vulnerability description" }, { "category": "summary", "text": "JBoss EAP Twiddle logs the JMX password", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3554" }, { "category": "external", "summary": "RHBZ#539495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539495" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3554", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3554" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3554", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3554" } ], "release_date": "2009-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-09T23:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1636" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4AS-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4AS-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4AS-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4AS-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.ep1.el4.src", "4ES-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.src", "4ES-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.18.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.21.el4.src", "4ES-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.21.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el4.src", "4ES-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP-4.3.0:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JBoss EAP Twiddle logs the JMX password" } ] }
rhsa-2009_1582
Vulnerability from csaf_redhat
Published
2009-11-12 18:15
Modified
2024-11-14 10:47
Summary
Red Hat Security Advisory: java-1.6.0-ibm security update
Notes
Topic
Updated java-1.6.0-ibm packages that fix several security issues are now
available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
Details
The IBM 1.6.0 Java release includes the IBM Java 2 Runtime Environment and
the IBM Java 2 Software Development Kit.
This update fixes several vulnerabilities in the IBM Java 2 Runtime
Environment and the IBM Java 2 Software Development Kit. These
vulnerabilities are summarized on the IBM "Security alerts" page listed in
the References section. (CVE-2009-2625, CVE-2009-2670, CVE-2009-2671,
CVE-2009-2672, CVE-2009-2673, CVE-2009-2674, CVE-2009-2675, CVE-2009-2676)
All users of java-1.6.0-ibm are advised to upgrade to these updated
packages, containing the IBM 1.6.0 SR6 Java release. All running instances
of IBM Java must be restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The IBM 1.6.0 Java release includes the IBM Java 2 Runtime Environment and\nthe IBM Java 2 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 2 Runtime\nEnvironment and the IBM Java 2 Software Development Kit. These\nvulnerabilities are summarized on the IBM \"Security alerts\" page listed in\nthe References section. (CVE-2009-2625, CVE-2009-2670, CVE-2009-2671,\nCVE-2009-2672, CVE-2009-2673, CVE-2009-2674, CVE-2009-2675, CVE-2009-2676)\n\nAll users of java-1.6.0-ibm are advised to upgrade to these updated\npackages, containing the IBM 1.6.0 SR6 Java release. All running instances\nof IBM Java must be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1582", "url": "https://access.redhat.com/errata/RHSA-2009:1582" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "512896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896" }, { "category": "external", "summary": "512907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907" }, { "category": "external", "summary": "512914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914" }, { "category": "external", "summary": "512915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915" }, { "category": "external", "summary": "512920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920" }, { "category": "external", "summary": "512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "515890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1582.json" } ], "title": "Red Hat Security Advisory: java-1.6.0-ibm security update", "tracking": { "current_release_date": "2024-11-14T10:47:07+00:00", "generator": { "date": "2024-11-14T10:47:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2009:1582", "initial_release_date": "2009-11-12T18:15:00+00:00", "revision_history": [ { "date": "2009-11-12T18:15:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-11-12T13:15:19+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:47:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.6-1jpp.3.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.6-1jpp.3.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "product": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.6-1jpp.3.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.6-1jpp.3.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "product": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "product": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.6-1jpp.3.el5?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.6-1jpp.3.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "product": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.6-1jpp.3.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.6-1jpp.3.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el5?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.6-1jpp.3.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.6-1jpp.3.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "product": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "product": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.6-1jpp.3.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.6-1jpp.3.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.6-1jpp.3.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "product": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el5?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.6-1jpp.3.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.6-1jpp.3.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el5?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "product": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.6-1jpp.3.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el5?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "product": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.6-1jpp.3.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "product_id": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.6-1jpp.3.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.6-1jpp.3.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "product": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "product_id": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.6-1jpp.3.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.6-1jpp.3.el5?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-2625", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512921" } ], "notes": [ { "category": "description", "text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: XML parsing Denial-Of-Service (6845701)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2625" }, { "category": "external", "summary": "RHBZ#512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-11-12T18:15:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1582" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: XML parsing Denial-Of-Service (6845701)" }, { "cve": "CVE-2009-2670", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512896" } ], "notes": [ { "category": "description", "text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Untrusted applet System properties access (6738524)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2670" }, { "category": "external", "summary": "RHBZ#512896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2670" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-11-12T18:15:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1582" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK Untrusted applet System properties access (6738524)" }, { "cve": "CVE-2009-2671", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512907" } ], "notes": [ { "category": "description", "text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Proxy mechanism information leaks (6801071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2671" }, { "category": "external", "summary": "RHBZ#512907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2671" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-11-12T18:15:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1582" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Proxy mechanism information leaks (6801071)" }, { "cve": "CVE-2009-2672", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512907" } ], "notes": [ { "category": "description", "text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Proxy mechanism information leaks (6801071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2672" }, { "category": "external", "summary": "RHBZ#512907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-11-12T18:15:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1582" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Proxy mechanism information leaks (6801071)" }, { "cve": "CVE-2009-2673", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512914" } ], "notes": [ { "category": "description", "text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2673" }, { "category": "external", "summary": "RHBZ#512914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2673" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-11-12T18:15:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1582" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)" }, { "cve": "CVE-2009-2674", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512915" } ], "notes": [ { "category": "description", "text": "Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start Buffer JPEG processing integer overflow (6823373)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2674" }, { "category": "external", "summary": "RHBZ#512915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2674", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2674" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-11-12T18:15:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1582" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java Web Start Buffer JPEG processing integer overflow (6823373)" }, { "cve": "CVE-2009-2675", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512920" } ], "notes": [ { "category": "description", "text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2675" }, { "category": "external", "summary": "RHBZ#512920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-11-12T18:15:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1582" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)" }, { "cve": "CVE-2009-2676", "discovery_date": "2009-08-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "515890" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.", "title": "Vulnerability description" }, { "category": "summary", "text": "JRE applet launcher vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2676" }, { "category": "external", "summary": "RHBZ#515890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2676", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2676" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-11-12T18:15:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1582" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.ppc64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.6-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.6-1jpp.3.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JRE applet launcher vulnerability" } ] }
rhsa-2012_1232
Vulnerability from csaf_redhat
Published
2012-09-05 16:26
Modified
2024-11-22 05:43
Summary
Red Hat Security Advisory: JBoss Enterprise Portal Platform 5.2.2 update
Notes
Topic
JBoss Enterprise Portal Platform 5.2.2, which fixes multiple security
issues and various bugs, is now available from the Red Hat Customer Portal.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
JBoss Enterprise Portal Platform is the open source implementation of the
Java EE suite of services and Portal services running atop JBoss Enterprise
Application Platform. It comprises a set of offerings for enterprise
customers who are looking for pre-configured profiles of JBoss Enterprise
Middleware components that have been tested and certified together to
provide an integrated experience.
This release of JBoss Enterprise Portal Platform 5.2.2 serves as a
replacement for JBoss Enterprise Portal Platform 5.2.1, and includes bug
fixes. Refer to the JBoss Enterprise Portal Platform 5.2.2 Release Notes
for information on the most significant of these changes. The Release Notes
will be available shortly from https://access.redhat.com/knowledge/docs/
The following security issues are also fixed with this release:
It was found that the JBoss JNDI service allowed unauthenticated, remote
write access by default. The JNDI and HA-JNDI services, and the
HAJNDIFactory invoker servlet were all affected. A remote attacker able to
access the JNDI service (port 1099), HA-JNDI service (port 1100), or the
HAJNDIFactory invoker servlet on a JBoss server could use this flaw to add,
delete, and modify items in the JNDI tree. This could have various,
application-specific impacts. (CVE-2011-4605)
A flaw was found in the way the Apache Xerces2 Java Parser processed the
SYSTEM identifier in DTDs. A remote attacker could provide a
specially-crafted XML file, which once parsed by an application using the
Apache Xerces2 Java Parser, would lead to a denial of service (application
hang due to excessive CPU use). (CVE-2009-2625)
It was found that the JMX Console did not protect against Cross-Site
Request Forgery (CSRF) attacks. If a remote attacker could trick a user,
who was logged into the JMX Console, into visiting a specially-crafted URL,
the attacker could perform operations on MBeans, which may lead to
arbitrary code execution in the context of the JBoss server process.
(CVE-2011-2908)
A flaw was found in the way Apache POI, a Java API for manipulating files
created with a Microsoft Office application, handled memory when processing
certain Channel Definition Format (CDF) and Compound File Binary Format
(CFBF) documents. A remote attacker could provide a specially-crafted CDF
or CFBF document to an application using Apache POI, leading to a denial of
service. (CVE-2012-0213)
When a JBoss server is configured to use JaccAuthorizationRealm, the
WebPermissionMapping class creates permissions that are not checked and can
permit access to users without checking their roles. If the
ignoreBaseDecision property is set to true on JBossWebRealm, the web
authorization process is handled exclusively by JBossAuthorizationEngine,
without any input from JBoss Web. This allows any valid user to access an
application, without needing to be assigned the role specified in the
application's web.xml "security-constraint" tag. (CVE-2012-1167)
When a JGroups channel is started, the JGroups diagnostics service would be
enabled by default with no authentication. This service is exposed via IP
multicast. An attacker on an adjacent network could exploit this flaw to
read diagnostics information. (CVE-2012-2377)
Red Hat would like to thank Christian Schlüter (VIADA) for reporting the
CVE-2011-4605 issue.
Warning: Before applying this update, back up all applications deployed on
JBoss Enterprise Portal Platform, along with all customized configuration
files, and any databases and database settings.
All users of JBoss Enterprise Portal Platform 5.2.1 as provided from the
Red Hat Customer Portal are advised to upgrade to JBoss Enterprise Portal
Platform 5.2.2.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "JBoss Enterprise Portal Platform 5.2.2, which fixes multiple security\nissues and various bugs, is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "JBoss Enterprise Portal Platform is the open source implementation of the\nJava EE suite of services and Portal services running atop JBoss Enterprise\nApplication Platform. It comprises a set of offerings for enterprise\ncustomers who are looking for pre-configured profiles of JBoss Enterprise\nMiddleware components that have been tested and certified together to\nprovide an integrated experience.\n\nThis release of JBoss Enterprise Portal Platform 5.2.2 serves as a\nreplacement for JBoss Enterprise Portal Platform 5.2.1, and includes bug\nfixes. Refer to the JBoss Enterprise Portal Platform 5.2.2 Release Notes\nfor information on the most significant of these changes. The Release Notes\nwill be available shortly from https://access.redhat.com/knowledge/docs/\n\nThe following security issues are also fixed with this release:\n\nIt was found that the JBoss JNDI service allowed unauthenticated, remote\nwrite access by default. The JNDI and HA-JNDI services, and the\nHAJNDIFactory invoker servlet were all affected. A remote attacker able to\naccess the JNDI service (port 1099), HA-JNDI service (port 1100), or the\nHAJNDIFactory invoker servlet on a JBoss server could use this flaw to add,\ndelete, and modify items in the JNDI tree. This could have various,\napplication-specific impacts. (CVE-2011-4605)\n\nA flaw was found in the way the Apache Xerces2 Java Parser processed the\nSYSTEM identifier in DTDs. A remote attacker could provide a\nspecially-crafted XML file, which once parsed by an application using the\nApache Xerces2 Java Parser, would lead to a denial of service (application\nhang due to excessive CPU use). (CVE-2009-2625)\n\nIt was found that the JMX Console did not protect against Cross-Site\nRequest Forgery (CSRF) attacks. If a remote attacker could trick a user,\nwho was logged into the JMX Console, into visiting a specially-crafted URL,\nthe attacker could perform operations on MBeans, which may lead to\narbitrary code execution in the context of the JBoss server process.\n(CVE-2011-2908)\n\nA flaw was found in the way Apache POI, a Java API for manipulating files\ncreated with a Microsoft Office application, handled memory when processing\ncertain Channel Definition Format (CDF) and Compound File Binary Format\n(CFBF) documents. A remote attacker could provide a specially-crafted CDF\nor CFBF document to an application using Apache POI, leading to a denial of\nservice. (CVE-2012-0213)\n\nWhen a JBoss server is configured to use JaccAuthorizationRealm, the\nWebPermissionMapping class creates permissions that are not checked and can\npermit access to users without checking their roles. If the\nignoreBaseDecision property is set to true on JBossWebRealm, the web\nauthorization process is handled exclusively by JBossAuthorizationEngine,\nwithout any input from JBoss Web. This allows any valid user to access an\napplication, without needing to be assigned the role specified in the\napplication\u0027s web.xml \"security-constraint\" tag. (CVE-2012-1167)\n\nWhen a JGroups channel is started, the JGroups diagnostics service would be\nenabled by default with no authentication. This service is exposed via IP\nmulticast. An attacker on an adjacent network could exploit this flaw to\nread diagnostics information. (CVE-2012-2377)\n\nRed Hat would like to thank Christian Schl\u00fcter (VIADA) for reporting the\nCVE-2011-4605 issue.\n\nWarning: Before applying this update, back up all applications deployed on\nJBoss Enterprise Portal Platform, along with all customized configuration\nfiles, and any databases and database settings.\n\nAll users of JBoss Enterprise Portal Platform 5.2.1 as provided from the\nRed Hat Customer Portal are advised to upgrade to JBoss Enterprise Portal\nPlatform 5.2.2.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1232", "url": "https://access.redhat.com/errata/RHSA-2012:1232" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jbportal\u0026downloadType=distributions", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jbportal\u0026downloadType=distributions" }, { "category": "external", "summary": "https://access.redhat.com/knowledge/docs/", "url": "https://access.redhat.com/knowledge/docs/" }, { "category": "external", "summary": "512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "730176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=730176" }, { "category": "external", "summary": "766469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=766469" }, { "category": "external", "summary": "799078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799078" }, { "category": "external", "summary": "802622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=802622" }, { "category": "external", "summary": "823392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=823392" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1232.json" } ], "title": "Red Hat Security Advisory: JBoss Enterprise Portal Platform 5.2.2 update", "tracking": { "current_release_date": "2024-11-22T05:43:34+00:00", "generator": { "date": "2024-11-22T05:43:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2012:1232", "initial_release_date": "2012-09-05T16:26:00+00:00", "revision_history": [ { "date": "2012-09-05T16:26:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-09-05T16:25:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T05:43:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Portal 5.2", "product": { "name": "Red Hat JBoss Portal 5.2", "product_id": "Red Hat JBoss Portal 5.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_portal_platform:5.2" } } } ], "category": "product_family", "name": "Red Hat JBoss Middleware" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-2625", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512921" } ], "notes": [ { "category": "description", "text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: XML parsing Denial-Of-Service (6845701)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal 5.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2625" }, { "category": "external", "summary": "RHBZ#512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-05T16:26:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files, and any databases and database settings.", "product_ids": [ "Red Hat JBoss Portal 5.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1232" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Portal 5.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: XML parsing Denial-Of-Service (6845701)" }, { "cve": "CVE-2011-2908", "cwe": { "id": "CWE-352", "name": "Cross-Site Request Forgery (CSRF)" }, "discovery_date": "2007-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "730176" } ], "notes": [ { "category": "description", "text": "Cross-site request forgery (CSRF) vulnerability in the JMX Console (jmx-console) in JBoss Enterprise Portal Platform before 5.2.2, BRMS Platform 5.3.0 before roll up patch1, and SOA Platform 5.3.0 allows remote authenticated users to hijack the authentication of arbitrary users for requests that perform operations on MBeans and possibly execute arbitrary code via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "CSRF on jmx-console allows invocation of operations on mbeans", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal 5.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2908" }, { "category": "external", "summary": "RHBZ#730176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=730176" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2908", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2908" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2908", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2908" } ], "release_date": "2007-02-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-05T16:26:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files, and any databases and database settings.", "product_ids": [ "Red Hat JBoss Portal 5.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1232" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Portal 5.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "CSRF on jmx-console allows invocation of operations on mbeans" }, { "acknowledgments": [ { "names": [ "Christian Schl\u00fcter" ], "organization": "VIADA" } ], "cve": "CVE-2011-4605", "cwe": { "id": "CWE-306", "name": "Missing Authentication for Critical Function" }, "discovery_date": "2011-12-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "766469" } ], "notes": [ { "category": "description", "text": "The (1) JNDI service, (2) HA-JNDI service, and (3) HAJNDIFactory invoker servlet in JBoss Enterprise Application Platform 4.3.0 CP10 and 5.1.2, Web Platform 5.1.2, SOA Platform 4.2.0.CP05 and 4.3.0.CP05, Portal Platform 4.3 CP07 and 5.2.x before 5.2.2, and BRMS Platform before 5.3.0 do not properly restrict write access, which allows remote attackers to add, delete, or modify items in a JNDI tree via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "JNDI: unauthenticated remote write access is permitted by default", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal 5.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-4605" }, { "category": "external", "summary": "RHBZ#766469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=766469" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-4605", "url": "https://www.cve.org/CVERecord?id=CVE-2011-4605" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-4605", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-4605" } ], "release_date": "2012-06-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-05T16:26:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files, and any databases and database settings.", "product_ids": [ "Red Hat JBoss Portal 5.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1232" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Portal 5.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JNDI: unauthenticated remote write access is permitted by default" }, { "cve": "CVE-2012-0213", "discovery_date": "2012-03-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "799078" } ], "notes": [ { "category": "description", "text": "The UnhandledDataStructure function in hwpf/model/UnhandledDataStructure.java in Apache POI 3.8 and earlier allows remote attackers to cause a denial of service (OutOfMemoryError exception and possibly JVM destabilization) via a crafted length value in a Channel Definition Format (CDF) or Compound File Binary Format (CFBF) document.", "title": "Vulnerability description" }, { "category": "summary", "text": "jakarta: JVM destabilization due to memory exhaustion when processing CDF/CFBF files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal 5.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-0213" }, { "category": "external", "summary": "RHBZ#799078", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=799078" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-0213", "url": "https://www.cve.org/CVERecord?id=CVE-2012-0213" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-0213", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0213" } ], "release_date": "2012-05-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-05T16:26:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files, and any databases and database settings.", "product_ids": [ "Red Hat JBoss Portal 5.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1232" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Portal 5.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jakarta: JVM destabilization due to memory exhaustion when processing CDF/CFBF files" }, { "cve": "CVE-2012-1167", "discovery_date": "2012-03-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "802622" } ], "notes": [ { "category": "description", "text": "The JBoss Server in JBoss Enterprise Application Platform 5.1.x before 5.1.2 and 5.2.x before 5.2.2, Web Platform before 5.1.2, BRMS Platform before 5.3.0, and SOA Platform before 5.3.0, when the server is configured to use the JaccAuthorizationRealm and the ignoreBaseDecision property is set to true on the JBossWebRealm, does not properly check the permissions created by the WebPermissionMapping class, which allows remote authenticated users to access arbitrary applications.", "title": "Vulnerability description" }, { "category": "summary", "text": "JBoss: authentication bypass when running under JACC with ignoreBaseDecision on JBossWebRealm", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal 5.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-1167" }, { "category": "external", "summary": "RHBZ#802622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=802622" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-1167", "url": "https://www.cve.org/CVERecord?id=CVE-2012-1167" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-1167", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-1167" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-05T16:26:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files, and any databases and database settings.", "product_ids": [ "Red Hat JBoss Portal 5.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1232" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Portal 5.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JBoss: authentication bypass when running under JACC with ignoreBaseDecision on JBossWebRealm" }, { "acknowledgments": [ { "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2012-2377", "discovery_date": "2012-05-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "823392" } ], "notes": [ { "category": "description", "text": "JGroups diagnostics service in JBoss Enterprise Portal Platform before 5.2.2, SOA Platform before 5.3.0, and BRMS Platform before 5.3.0, is enabled without authentication when started by the JGroups channel, which allows remote attackers in adjacent networks to read diagnostics information via a crafted IP multicast.", "title": "Vulnerability description" }, { "category": "summary", "text": "JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal 5.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-2377" }, { "category": "external", "summary": "RHBZ#823392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=823392" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-2377", "url": "https://www.cve.org/CVERecord?id=CVE-2012-2377" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-2377", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-2377" } ], "release_date": "2012-06-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-09-05T16:26:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ncustomized configuration files, and any databases and database settings.", "product_ids": [ "Red Hat JBoss Portal 5.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1232" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Portal 5.2" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JGroups diagnostics service enabled by default with no authentication when a JGroups channel is started" } ] }
rhsa-2009_1615
Vulnerability from csaf_redhat
Published
2009-11-30 15:11
Modified
2024-11-14 10:47
Summary
Red Hat Security Advisory: xerces-j2 security update
Notes
Topic
Updated xerces-j2 packages that fix a security issue are now available for
Red Hat Enterprise Linux 5.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
The xerces-j2 packages provide the Apache Xerces2 Java Parser, a
high-performance XML parser. A Document Type Definition (DTD) defines the
legal syntax (and also which elements can be used) for certain types of
files, such as XML files.
A flaw was found in the way the Apache Xerces2 Java Parser processed the
SYSTEM identifier in DTDs. A remote attacker could provide a
specially-crafted XML file, which once parsed by an application using the
Apache Xerces2 Java Parser, would lead to a denial of service (application
hang due to excessive CPU use). (CVE-2009-2625)
Users should upgrade to these updated packages, which contain a backported
patch to correct this issue. Applications using the Apache Xerces2 Java
Parser must be restarted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated xerces-j2 packages that fix a security issue are now available for\nRed Hat Enterprise Linux 5.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The xerces-j2 packages provide the Apache Xerces2 Java Parser, a\nhigh-performance XML parser. A Document Type Definition (DTD) defines the\nlegal syntax (and also which elements can be used) for certain types of\nfiles, such as XML files.\n\nA flaw was found in the way the Apache Xerces2 Java Parser processed the\nSYSTEM identifier in DTDs. A remote attacker could provide a\nspecially-crafted XML file, which once parsed by an application using the\nApache Xerces2 Java Parser, would lead to a denial of service (application\nhang due to excessive CPU use). (CVE-2009-2625)\n\nUsers should upgrade to these updated packages, which contain a backported\npatch to correct this issue. Applications using the Apache Xerces2 Java\nParser must be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1615", "url": "https://access.redhat.com/errata/RHSA-2009:1615" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1615.json" } ], "title": "Red Hat Security Advisory: xerces-j2 security update", "tracking": { "current_release_date": "2024-11-14T10:47:21+00:00", "generator": { "date": "2024-11-14T10:47:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2009:1615", "initial_release_date": "2009-11-30T15:11:00+00:00", "revision_history": [ { "date": "2009-11-30T15:11:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-11-30T10:18:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:47:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "product": { "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "product_id": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-demo@2.7.1-7jpp.2.el5_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.x86_64", "product": { "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.x86_64", "product_id": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-other@2.7.1-7jpp.2.el5_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.x86_64", "product": { "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.x86_64", "product_id": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-apis@2.7.1-7jpp.2.el5_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "product": { "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "product_id": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-debuginfo@2.7.1-7jpp.2.el5_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.x86_64", "product": { "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.x86_64", "product_id": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-xni@2.7.1-7jpp.2.el5_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.x86_64", "product": { "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.x86_64", "product_id": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-impl@2.7.1-7jpp.2.el5_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.x86_64", "product": { "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.x86_64", "product_id": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2@2.7.1-7jpp.2.el5_4.2?arch=x86_64" } } }, { "category": "product_version", "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.x86_64", "product": { "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.x86_64", "product_id": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-scripts@2.7.1-7jpp.2.el5_4.2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.i386", "product": { "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.i386", "product_id": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-demo@2.7.1-7jpp.2.el5_4.2?arch=i386" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.i386", "product": { "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.i386", "product_id": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-other@2.7.1-7jpp.2.el5_4.2?arch=i386" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.i386", "product": { "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.i386", "product_id": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-apis@2.7.1-7jpp.2.el5_4.2?arch=i386" } } }, { "category": "product_version", "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.i386", "product": { "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.i386", "product_id": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-debuginfo@2.7.1-7jpp.2.el5_4.2?arch=i386" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.i386", "product": { "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.i386", "product_id": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-xni@2.7.1-7jpp.2.el5_4.2?arch=i386" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.i386", "product": { "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.i386", "product_id": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-impl@2.7.1-7jpp.2.el5_4.2?arch=i386" } } }, { "category": "product_version", "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.i386", "product": { "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.i386", "product_id": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2@2.7.1-7jpp.2.el5_4.2?arch=i386" } } }, { "category": "product_version", "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.i386", "product": { "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.i386", "product_id": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-scripts@2.7.1-7jpp.2.el5_4.2?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.src", "product": { "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.src", "product_id": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2@2.7.1-7jpp.2.el5_4.2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ia64", "product": { "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ia64", "product_id": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-demo@2.7.1-7jpp.2.el5_4.2?arch=ia64" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ia64", "product": { "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ia64", "product_id": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-other@2.7.1-7jpp.2.el5_4.2?arch=ia64" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ia64", "product": { "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ia64", "product_id": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-apis@2.7.1-7jpp.2.el5_4.2?arch=ia64" } } }, { "category": "product_version", "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ia64", "product": { "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ia64", "product_id": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2@2.7.1-7jpp.2.el5_4.2?arch=ia64" } } }, { "category": "product_version", "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ia64", "product": { "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ia64", "product_id": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-debuginfo@2.7.1-7jpp.2.el5_4.2?arch=ia64" } } }, { "category": "product_version", "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ia64", "product": { "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ia64", "product_id": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-scripts@2.7.1-7jpp.2.el5_4.2?arch=ia64" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ia64", "product": { "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ia64", "product_id": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-xni@2.7.1-7jpp.2.el5_4.2?arch=ia64" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ia64", "product": { "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ia64", "product_id": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-impl@2.7.1-7jpp.2.el5_4.2?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ppc", "product": { "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ppc", "product_id": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-demo@2.7.1-7jpp.2.el5_4.2?arch=ppc" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ppc", "product": { "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ppc", "product_id": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-other@2.7.1-7jpp.2.el5_4.2?arch=ppc" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ppc", "product": { "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ppc", "product_id": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-apis@2.7.1-7jpp.2.el5_4.2?arch=ppc" } } }, { "category": "product_version", "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ppc", "product": { "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ppc", "product_id": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2@2.7.1-7jpp.2.el5_4.2?arch=ppc" } } }, { "category": "product_version", "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ppc", "product": { "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ppc", "product_id": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-debuginfo@2.7.1-7jpp.2.el5_4.2?arch=ppc" } } }, { "category": "product_version", "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ppc", "product": { "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ppc", "product_id": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-scripts@2.7.1-7jpp.2.el5_4.2?arch=ppc" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ppc", "product": { "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ppc", "product_id": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-xni@2.7.1-7jpp.2.el5_4.2?arch=ppc" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ppc", "product": { "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ppc", "product_id": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-impl@2.7.1-7jpp.2.el5_4.2?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.s390x", "product": { "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.s390x", "product_id": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-demo@2.7.1-7jpp.2.el5_4.2?arch=s390x" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.s390x", "product": { "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.s390x", "product_id": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-other@2.7.1-7jpp.2.el5_4.2?arch=s390x" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.s390x", "product": { "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.s390x", "product_id": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-apis@2.7.1-7jpp.2.el5_4.2?arch=s390x" } } }, { "category": "product_version", "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.s390x", "product": { "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.s390x", "product_id": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2@2.7.1-7jpp.2.el5_4.2?arch=s390x" } } }, { "category": "product_version", "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.s390x", "product": { "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.s390x", "product_id": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-debuginfo@2.7.1-7jpp.2.el5_4.2?arch=s390x" } } }, { "category": "product_version", "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.s390x", "product": { "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.s390x", "product_id": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-scripts@2.7.1-7jpp.2.el5_4.2?arch=s390x" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.s390x", "product": { "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.s390x", "product_id": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-xni@2.7.1-7jpp.2.el5_4.2?arch=s390x" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.s390x", "product": { "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.s390x", "product_id": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-impl@2.7.1-7jpp.2.el5_4.2?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.i386" }, "product_reference": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ia64" }, "product_reference": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ppc" }, "product_reference": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.s390x" }, "product_reference": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.src" }, "product_reference": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.src", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.x86_64" }, "product_reference": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.i386" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ia64" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ppc" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.s390x" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.x86_64" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.i386" }, "product_reference": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ia64" }, "product_reference": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ppc" }, "product_reference": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.s390x" }, "product_reference": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.x86_64" }, "product_reference": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.i386" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ia64" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ppc" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.s390x" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.x86_64" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.i386" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ia64" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ppc" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.s390x" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.x86_64" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.i386" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ia64" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ppc" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.s390x" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.x86_64" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.i386" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ia64" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ppc" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.s390x" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.x86_64" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.i386" }, "product_reference": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.i386", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ia64" }, "product_reference": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ia64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ppc" }, "product_reference": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ppc", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.s390x" }, "product_reference": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.s390x", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.x86_64" }, "product_reference": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.x86_64", "relates_to_product_reference": "5Client-Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.i386" }, "product_reference": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ia64" }, "product_reference": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ppc" }, "product_reference": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.s390x" }, "product_reference": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.src" }, "product_reference": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.x86_64" }, "product_reference": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.i386" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ia64" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ppc" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.s390x" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.x86_64" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.i386" }, "product_reference": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ia64" }, "product_reference": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ppc" }, "product_reference": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.s390x" }, "product_reference": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.x86_64" }, "product_reference": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.i386" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ia64" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ppc" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.s390x" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.x86_64" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.i386" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ia64" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ppc" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.s390x" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.x86_64" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.i386" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ia64" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ppc" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.s390x" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.x86_64" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.i386" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ia64" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ppc" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.s390x" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.x86_64" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.i386" }, "product_reference": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ia64" }, "product_reference": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ppc" }, "product_reference": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.s390x" }, "product_reference": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.x86_64" }, "product_reference": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.i386" }, "product_reference": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ia64" }, "product_reference": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ppc" }, "product_reference": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.s390x" }, "product_reference": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.src" }, "product_reference": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.x86_64" }, "product_reference": "xerces-j2-0:2.7.1-7jpp.2.el5_4.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.i386" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ia64" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ppc" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.s390x" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.x86_64" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.i386" }, "product_reference": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ia64" }, "product_reference": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ppc" }, "product_reference": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.s390x" }, "product_reference": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.x86_64" }, "product_reference": "xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.i386" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ia64" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ppc" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.s390x" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.x86_64" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.i386" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ia64" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ppc" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.s390x" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.x86_64" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.i386" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ia64" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ppc" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.s390x" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.x86_64" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.i386" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ia64" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ppc" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.s390x" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.x86_64" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.i386" }, "product_reference": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ia64" }, "product_reference": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ppc" }, "product_reference": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.s390x" }, "product_reference": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.x86_64" }, "product_reference": "xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-2625", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512921" } ], "notes": [ { "category": "description", "text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: XML parsing Denial-Of-Service (6845701)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-Workstation:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client-Workstation:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client-Workstation:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client-Workstation:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client-Workstation:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.src", "5Client-Workstation:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client-Workstation:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client-Workstation:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client-Workstation:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client-Workstation:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client-Workstation:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client-Workstation:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client-Workstation:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client-Workstation:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client-Workstation:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client-Workstation:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client-Workstation:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client-Workstation:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client-Workstation:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client-Workstation:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client-Workstation:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client-Workstation:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client-Workstation:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client-Workstation:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client-Workstation:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client-Workstation:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client-Workstation:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client-Workstation:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client-Workstation:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client-Workstation:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client-Workstation:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client-Workstation:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client-Workstation:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client-Workstation:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client-Workstation:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client-Workstation:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client-Workstation:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client-Workstation:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client-Workstation:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client-Workstation:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client-Workstation:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.src", "5Client:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Server:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.i386", "5Server:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Server:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Server:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Server:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.src", "5Server:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Server:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.i386", "5Server:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Server:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Server:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Server:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Server:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.i386", "5Server:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Server:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Server:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Server:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Server:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.i386", "5Server:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Server:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Server:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Server:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Server:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.i386", "5Server:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Server:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Server:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Server:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Server:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.i386", "5Server:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Server:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Server:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Server:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Server:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.i386", "5Server:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Server:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Server:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Server:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Server:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.i386", "5Server:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Server:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Server:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Server:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2625" }, { "category": "external", "summary": "RHBZ#512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-11-30T15:11:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client-Workstation:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client-Workstation:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client-Workstation:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client-Workstation:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client-Workstation:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.src", "5Client-Workstation:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client-Workstation:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client-Workstation:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client-Workstation:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client-Workstation:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client-Workstation:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client-Workstation:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client-Workstation:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client-Workstation:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client-Workstation:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client-Workstation:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client-Workstation:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client-Workstation:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client-Workstation:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client-Workstation:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client-Workstation:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client-Workstation:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client-Workstation:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client-Workstation:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client-Workstation:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client-Workstation:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client-Workstation:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client-Workstation:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client-Workstation:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client-Workstation:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client-Workstation:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client-Workstation:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client-Workstation:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client-Workstation:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client-Workstation:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client-Workstation:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client-Workstation:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client-Workstation:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client-Workstation:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client-Workstation:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client-Workstation:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.src", "5Client:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Server:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.i386", "5Server:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Server:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Server:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Server:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.src", "5Server:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Server:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.i386", "5Server:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Server:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Server:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Server:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Server:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.i386", "5Server:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Server:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Server:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Server:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Server:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.i386", "5Server:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Server:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Server:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Server:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Server:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.i386", "5Server:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Server:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Server:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Server:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Server:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.i386", "5Server:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Server:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Server:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Server:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Server:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.i386", "5Server:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Server:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Server:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Server:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Server:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.i386", "5Server:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Server:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Server:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Server:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1615" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client-Workstation:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client-Workstation:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client-Workstation:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client-Workstation:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client-Workstation:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.src", "5Client-Workstation:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client-Workstation:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client-Workstation:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client-Workstation:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client-Workstation:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client-Workstation:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client-Workstation:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client-Workstation:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client-Workstation:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client-Workstation:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client-Workstation:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client-Workstation:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client-Workstation:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client-Workstation:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client-Workstation:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client-Workstation:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client-Workstation:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client-Workstation:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client-Workstation:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client-Workstation:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client-Workstation:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client-Workstation:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client-Workstation:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client-Workstation:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client-Workstation:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client-Workstation:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client-Workstation:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client-Workstation:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client-Workstation:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client-Workstation:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client-Workstation:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client-Workstation:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client-Workstation:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client-Workstation:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client-Workstation:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client-Workstation:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.src", "5Client:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Client:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.i386", "5Client:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Client:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Client:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Client:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Server:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.i386", "5Server:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Server:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Server:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Server:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.src", "5Server:xerces-j2-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Server:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.i386", "5Server:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Server:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Server:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Server:xerces-j2-debuginfo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Server:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.i386", "5Server:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Server:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Server:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Server:xerces-j2-demo-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Server:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.i386", "5Server:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Server:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Server:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Server:xerces-j2-javadoc-apis-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Server:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.i386", "5Server:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Server:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Server:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Server:xerces-j2-javadoc-impl-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Server:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.i386", "5Server:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Server:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Server:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Server:xerces-j2-javadoc-other-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Server:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.i386", "5Server:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Server:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Server:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Server:xerces-j2-javadoc-xni-0:2.7.1-7jpp.2.el5_4.2.x86_64", "5Server:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.i386", "5Server:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ia64", "5Server:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.ppc", "5Server:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.s390x", "5Server:xerces-j2-scripts-0:2.7.1-7jpp.2.el5_4.2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: XML parsing Denial-Of-Service (6845701)" } ] }
rhsa-2009_1662
Vulnerability from csaf_redhat
Published
2009-12-11 13:42
Modified
2024-11-14 10:47
Summary
Red Hat Security Advisory: Red Hat Network Satellite Server Sun Java Runtime security update
Notes
Topic
Updated java-1.5.0-sun packages that correct several security issues are
now available for Red Hat Network Satellite Server 5.1.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Details
This update corrects several security vulnerabilities in the Sun Java
Runtime Environment shipped as part of Red Hat Network Satellite Server
5.1. In a typical operating environment, these are of low security risk as
the runtime is not used on untrusted applets.
Several flaws were fixed in the Sun Java 5 Runtime Environment.
(CVE-2006-2426, CVE-2008-2086, CVE-2009-1093, CVE-2009-1094, CVE-2009-1095,
CVE-2009-1096, CVE-2009-1098, CVE-2009-1099, CVE-2009-1100, CVE-2009-1103,
CVE-2009-1104, CVE-2009-1107, CVE-2009-2409, CVE-2009-2475, CVE-2009-2625,
CVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673, CVE-2009-2675,
CVE-2009-2676, CVE-2009-2689, CVE-2009-3728, CVE-2009-3873, CVE-2009-3876,
CVE-2009-3877, CVE-2009-3879, CVE-2009-3880, CVE-2009-3881, CVE-2009-3882,
CVE-2009-3883, CVE-2009-3884)
Note: This is the final update for the java-1.5.0-sun packages, as the Sun
Java SE Release family 5.0 has now reached End of Service Life. An
alternative to Sun Java SE 5.0 is the Java 2 Technology Edition of the
IBM Developer Kit for Linux, which is available from the Satellite 5.1
channels on the Red Hat Network.
For a long term solution, Red Hat advises users to switch from Sun Java SE
5.0 to the Java 2 Technology Edition of the IBM Developer Kit for Linux.
Refer to the Solution section for instructions.
Users of Red Hat Network Satellite Server 5.1 are advised to upgrade to
these updated java-1.5.0-sun packages, which resolve these issues. All
running instances of Sun Java must be restarted for the update to take
effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.5.0-sun packages that correct several security issues are\nnow available for Red Hat Network Satellite Server 5.1.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "This update corrects several security vulnerabilities in the Sun Java\nRuntime Environment shipped as part of Red Hat Network Satellite Server\n5.1. In a typical operating environment, these are of low security risk as\nthe runtime is not used on untrusted applets.\n\nSeveral flaws were fixed in the Sun Java 5 Runtime Environment.\n(CVE-2006-2426, CVE-2008-2086, CVE-2009-1093, CVE-2009-1094, CVE-2009-1095,\nCVE-2009-1096, CVE-2009-1098, CVE-2009-1099, CVE-2009-1100, CVE-2009-1103,\nCVE-2009-1104, CVE-2009-1107, CVE-2009-2409, CVE-2009-2475, CVE-2009-2625,\nCVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673, CVE-2009-2675,\nCVE-2009-2676, CVE-2009-2689, CVE-2009-3728, CVE-2009-3873, CVE-2009-3876,\nCVE-2009-3877, CVE-2009-3879, CVE-2009-3880, CVE-2009-3881, CVE-2009-3882,\nCVE-2009-3883, CVE-2009-3884)\n\nNote: This is the final update for the java-1.5.0-sun packages, as the Sun\nJava SE Release family 5.0 has now reached End of Service Life. An\nalternative to Sun Java SE 5.0 is the Java 2 Technology Edition of the\nIBM Developer Kit for Linux, which is available from the Satellite 5.1\nchannels on the Red Hat Network.\n\nFor a long term solution, Red Hat advises users to switch from Sun Java SE\n5.0 to the Java 2 Technology Edition of the IBM Developer Kit for Linux.\nRefer to the Solution section for instructions.\n\nUsers of Red Hat Network Satellite Server 5.1 are advised to upgrade to\nthese updated java-1.5.0-sun packages, which resolve these issues. All\nrunning instances of Sun Java must be restarted for the update to take\neffect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1662", "url": "https://access.redhat.com/errata/RHSA-2009:1662" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "395481", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=395481" }, { "category": "external", "summary": "474556", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=474556" }, { "category": "external", "summary": "490167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490167" }, { "category": "external", "summary": "490168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490168" }, { "category": "external", "summary": "490169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490169" }, { "category": "external", "summary": "490178", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490178" }, { "category": "external", "summary": "492302", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492302" }, { "category": "external", "summary": "492305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492305" }, { "category": "external", "summary": "492306", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492306" }, { "category": "external", "summary": "492308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492308" }, { "category": "external", "summary": "492312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492312" }, { "category": "external", "summary": "510197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510197" }, { "category": "external", "summary": "512896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896" }, { "category": "external", "summary": "512907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907" }, { "category": "external", "summary": "512914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914" }, { "category": "external", "summary": "512920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920" }, { "category": "external", "summary": "512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "513215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215" }, { "category": "external", "summary": "513222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222" }, { "category": "external", "summary": "515890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890" }, { "category": "external", "summary": "530053", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530053" }, { "category": "external", "summary": "530061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061" }, { "category": "external", "summary": "530098", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530098" }, { "category": "external", "summary": "530173", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530173" }, { "category": "external", "summary": "530175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530175" }, { "category": "external", "summary": "530296", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530296" }, { "category": "external", "summary": "530297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530297" }, { "category": "external", "summary": "530300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530300" }, { "category": "external", "summary": "533185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533185" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1662.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite Server Sun Java Runtime security update", "tracking": { "current_release_date": "2024-11-14T10:47:45+00:00", "generator": { "date": "2024-11-14T10:47:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2009:1662", "initial_release_date": "2009-12-11T13:42:00+00:00", "revision_history": [ { "date": "2009-12-11T13:42:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-12-11T08:42:50+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:47:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.1 (RHEL v.4 AS)", "product": { "name": "Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.1::el4" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64", "product": { "name": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64", "product_id": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.22-1jpp.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "product": { "name": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "product_id": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.22-1jpp.1.el4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "product": { "name": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "product_id": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.22-1jpp.1.el4?arch=i586" } } }, { "category": "product_version", "name": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "product": { "name": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "product_id": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.22-1jpp.1.el4?arch=i586" } } } ], "category": "architecture", "name": "i586" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586 as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-RHNSAT5.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64 as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-RHNSAT5.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586 as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-RHNSAT5.1" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64 as a component of Red Hat Satellite 5.1 (RHEL v.4 AS)", "product_id": "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-RHNSAT5.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2006-2426", "discovery_date": "2007-11-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "395481" } ], "notes": [ { "category": "description", "text": "Sun Java Runtime Environment (JRE) 1.5.0_6 and earlier, JDK 1.5.0_6 and earlier, and SDK 1.5.0_6 and earlier allows remote attackers to cause a denial of service (disk consumption) by using the Font.createFont function to create temporary files of arbitrary size in the %temp% directory.", "title": "Vulnerability description" }, { "category": "summary", "text": "Untrusted applet causes DoS by filling up disk space", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-2426" }, { "category": "external", "summary": "RHBZ#395481", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=395481" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-2426", "url": "https://www.cve.org/CVERecord?id=CVE-2006-2426" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-2426", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-2426" } ], "release_date": "2006-05-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "Untrusted applet causes DoS by filling up disk space" }, { "cve": "CVE-2008-2086", "discovery_date": "2008-12-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "474556" } ], "notes": [ { "category": "description", "text": "Sun Java Web Start and Java Plug-in for JDK and JRE 6 Update 10 and earlier; JDK and JRE 5.0 Update 16 and earlier; and SDK and JRE 1.4.2_18 and earlier allow remote attackers to execute arbitrary code via a crafted jnlp file that modifies the (1) java.home, (2) java.ext.dirs, or (3) user.home System Properties, aka \"Java Web Start File Inclusion\" and CR 6694892.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start File Inclusion via System Properties Override", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-2086" }, { "category": "external", "summary": "RHBZ#474556", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=474556" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-2086", "url": "https://www.cve.org/CVERecord?id=CVE-2008-2086" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-2086", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-2086" } ], "release_date": "2008-12-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Java Web Start File Inclusion via System Properties Override" }, { "cve": "CVE-2009-1093", "discovery_date": "2009-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "490167" } ], "notes": [ { "category": "description", "text": "LdapCtx in the LDAP service in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier does not close the connection when initialization fails, which allows remote attackers to cause a denial of service (LDAP service hang).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK remote LDAP Denial-Of-Service (6717680)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1093" }, { "category": "external", "summary": "RHBZ#490167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1093", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1093" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1093", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1093" } ], "release_date": "2009-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK remote LDAP Denial-Of-Service (6717680)" }, { "cve": "CVE-2009-1094", "discovery_date": "2009-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "490168" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the LDAP implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier allows remote LDAP servers to execute arbitrary code via unknown vectors related to serialized data.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK LDAP client remote code execution (6737315)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1094" }, { "category": "external", "summary": "RHBZ#490168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1094", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1094" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1094", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1094" } ], "release_date": "2009-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK LDAP client remote code execution (6737315)" }, { "cve": "CVE-2009-1095", "discovery_date": "2009-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "490169" } ], "notes": [ { "category": "description", "text": "Integer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1095" }, { "category": "external", "summary": "RHBZ#490169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1095", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1095" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1095", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1095" } ], "release_date": "2009-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)" }, { "cve": "CVE-2009-1096", "discovery_date": "2009-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "490169" } ], "notes": [ { "category": "description", "text": "Buffer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1096" }, { "category": "external", "summary": "RHBZ#490169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1096", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1096" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1096", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1096" } ], "release_date": "2009-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)" }, { "cve": "CVE-2009-1098", "discovery_date": "2009-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "490178" } ], "notes": [ { "category": "description", "text": "Buffer overflow in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files or execute arbitrary code via a crafted GIF image, aka CR 6804998.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK GIF processing buffer overflow vulnerability (6804998)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1098" }, { "category": "external", "summary": "RHBZ#490178", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490178" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1098", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1098" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1098", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1098" } ], "release_date": "2009-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK GIF processing buffer overflow vulnerability (6804998)" }, { "cve": "CVE-2009-1099", "discovery_date": "2009-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "492302" } ], "notes": [ { "category": "description", "text": "Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via crafted glyph descriptions in a Type1 font, which bypasses a signed comparison and triggers a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Type1 font processing buffer overflow vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1099" }, { "category": "external", "summary": "RHBZ#492302", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492302" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1099", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1099" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1099", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1099" } ], "release_date": "2009-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Type1 font processing buffer overflow vulnerability" }, { "cve": "CVE-2009-1100", "discovery_date": "2009-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "492305" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allow remote attackers to cause a denial of service (disk consumption) via vectors related to temporary font files and (1) \"limits on Font creation,\" aka CR 6522586, and (2) another unspecified vector, aka CR 6632886.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: DoS (disk consumption) via handling of temporary font files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1100" }, { "category": "external", "summary": "RHBZ#492305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492305" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1100", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1100" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1100", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1100" } ], "release_date": "2009-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: DoS (disk consumption) via handling of temporary font files" }, { "cve": "CVE-2009-1103", "discovery_date": "2009-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "492306" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files and execute arbitrary code via unknown vectors related to \"deserializing applets,\" aka CR 6646860.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Files disclosure, arbitrary code execution via \"deserializing applets\" (6646860)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1103" }, { "category": "external", "summary": "RHBZ#492306", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492306" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1103", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1103" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1103", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1103" } ], "release_date": "2009-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Files disclosure, arbitrary code execution via \"deserializing applets\" (6646860)" }, { "cve": "CVE-2009-1104", "discovery_date": "2009-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "492308" } ], "notes": [ { "category": "description", "text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; and 1.4.2_19 and earlier does not prevent Javascript that is loaded from the localhost from connecting to other ports on the system, which allows user-assisted attackers to bypass intended access restrictions via LiveConnect, aka CR 6724331. NOTE: this vulnerability can be leveraged with separate cross-site scripting (XSS) vulnerabilities for remote attack vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Intended access restrictions bypass via LiveConnect (6724331)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1104" }, { "category": "external", "summary": "RHBZ#492308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492308" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1104", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1104" } ], "release_date": "2009-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Intended access restrictions bypass via LiveConnect (6724331)" }, { "cve": "CVE-2009-1107", "discovery_date": "2009-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "492312" } ], "notes": [ { "category": "description", "text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier, and 5.0 Update 17 and earlier, allows remote attackers to trick a user into trusting a signed applet via unknown vectors that misrepresent the security warning dialog, related to a \"Swing JLabel HTML parsing vulnerability,\" aka CR 6782871.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Signed applet remote misuse possibility (6782871)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1107" }, { "category": "external", "summary": "RHBZ#492312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492312" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1107", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1107" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1107", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1107" } ], "release_date": "2009-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Signed applet remote misuse possibility (6782871)" }, { "cve": "CVE-2009-2409", "discovery_date": "2009-02-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "510197" } ], "notes": [ { "category": "description", "text": "The Network Security Services (NSS) library before 3.12.3, as used in Firefox; GnuTLS before 2.6.4 and 2.7.4; OpenSSL 0.9.8 through 0.9.8k; and other products support MD2 with X.509 certificates, which might allow remote attackers to spoof certificates by using MD2 design flaws to generate a hash collision in less than brute-force time. NOTE: the scope of this issue is currently limited because the amount of computation required is still large.", "title": "Vulnerability description" }, { "category": "summary", "text": "deprecate MD2 in SSL cert validation (Kaminsky)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2409" }, { "category": "external", "summary": "RHBZ#510197", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510197" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2409", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2409" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2409", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2409" } ], "release_date": "2009-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "deprecate MD2 in SSL cert validation (Kaminsky)" }, { "cve": "CVE-2009-2475", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "513215" } ], "notes": [ { "category": "description", "text": "Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2475" }, { "category": "external", "summary": "RHBZ#513215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2475", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)" }, { "cve": "CVE-2009-2625", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512921" } ], "notes": [ { "category": "description", "text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: XML parsing Denial-Of-Service (6845701)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2625" }, { "category": "external", "summary": "RHBZ#512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: XML parsing Denial-Of-Service (6845701)" }, { "cve": "CVE-2009-2670", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512896" } ], "notes": [ { "category": "description", "text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Untrusted applet System properties access (6738524)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2670" }, { "category": "external", "summary": "RHBZ#512896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2670" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK Untrusted applet System properties access (6738524)" }, { "cve": "CVE-2009-2671", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512907" } ], "notes": [ { "category": "description", "text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Proxy mechanism information leaks (6801071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2671" }, { "category": "external", "summary": "RHBZ#512907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2671" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Proxy mechanism information leaks (6801071)" }, { "cve": "CVE-2009-2672", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512907" } ], "notes": [ { "category": "description", "text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Proxy mechanism information leaks (6801071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2672" }, { "category": "external", "summary": "RHBZ#512907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Proxy mechanism information leaks (6801071)" }, { "cve": "CVE-2009-2673", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512914" } ], "notes": [ { "category": "description", "text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2673" }, { "category": "external", "summary": "RHBZ#512914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2673" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)" }, { "cve": "CVE-2009-2675", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512920" } ], "notes": [ { "category": "description", "text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2675" }, { "category": "external", "summary": "RHBZ#512920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)" }, { "cve": "CVE-2009-2676", "discovery_date": "2009-08-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "515890" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.", "title": "Vulnerability description" }, { "category": "summary", "text": "JRE applet launcher vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2676" }, { "category": "external", "summary": "RHBZ#515890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2676", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2676" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JRE applet launcher vulnerability" }, { "cve": "CVE-2009-2689", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "513222" } ], "notes": [ { "category": "description", "text": "JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK JDK13Services grants unnecessary privileges (6777448)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2689" }, { "category": "external", "summary": "RHBZ#513222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2689", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2689" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2689", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2689" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK JDK13Services grants unnecessary privileges (6777448)" }, { "cve": "CVE-2009-3728", "discovery_date": "2009-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530098" } ], "notes": [ { "category": "description", "text": "Directory traversal vulnerability in the ICC_Profile.getInstance method in Java Runtime Environment (JRE) in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, allows remote attackers to determine the existence of local International Color Consortium (ICC) profile files via a .. (dot dot) in a pathname, aka Bug Id 6631533.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK ICC_Profile file existence detection information leak (6631533)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3728" }, { "category": "external", "summary": "RHBZ#530098", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530098" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3728", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3728" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3728", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3728" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK ICC_Profile file existence detection information leak (6631533)" }, { "cve": "CVE-2009-3873", "discovery_date": "2009-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530053" } ], "notes": [ { "category": "description", "text": "The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a \"quantization problem,\" aka Bug Id 6862968.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK JPEG Image Writer quantization problem (6862968)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3873" }, { "category": "external", "summary": "RHBZ#530053", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530053" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3873", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3873" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3873", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3873" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK JPEG Image Writer quantization problem (6862968)" }, { "cve": "CVE-2009-3876", "discovery_date": "2009-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530061" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted DER encoded data, which is not properly decoded by the ASN.1 DER input stream parser, aka Bug Id 6864911.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3876" }, { "category": "external", "summary": "RHBZ#530061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3876", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3876" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3876", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3876" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877" }, { "cve": "CVE-2009-3877", "discovery_date": "2009-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530061" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3877" }, { "category": "external", "summary": "RHBZ#530061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3877", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3877" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3877", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3877" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877" }, { "cve": "CVE-2009-3879", "discovery_date": "2009-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530297" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the (1) X11 and (2) Win32GraphicsDevice subsystems in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and attack vectors, related to failure to clone arrays that are returned by the getConfigurations function, aka Bug Id 6822057.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK GraphicsConfiguration information leak(6822057)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3879" }, { "category": "external", "summary": "RHBZ#530297", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530297" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3879", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3879" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3879", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3879" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK GraphicsConfiguration information leak(6822057)" }, { "cve": "CVE-2009-3880", "discovery_date": "2009-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530296" } ], "notes": [ { "category": "description", "text": "The Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, does not properly restrict the objects that may be sent to loggers, which allows attackers to obtain sensitive information via vectors related to the implementation of Component, KeyboardFocusManager, and DefaultKeyboardFocusManager, aka Bug Id 6664512.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK UI logging information leakage(6664512)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3880" }, { "category": "external", "summary": "RHBZ#530296", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530296" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3880", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3880" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3880", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3880" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK UI logging information leakage(6664512)" }, { "cve": "CVE-2009-3881", "discovery_date": "2009-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530173" } ], "notes": [ { "category": "description", "text": "Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, does not prevent the existence of children of a resurrected ClassLoader, which allows remote attackers to gain privileges via unspecified vectors, related to an \"information leak vulnerability,\" aka Bug Id 6636650.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK resurrected classloaders can still have children (6636650)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3881" }, { "category": "external", "summary": "RHBZ#530173", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530173" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3881", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3881" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3881", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3881" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK resurrected classloaders can still have children (6636650)" }, { "cve": "CVE-2009-3882", "discovery_date": "2009-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530175" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the Swing implementation in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and remote attack vectors, related to \"information leaks in mutable variables,\" aka Bug Id 6657026.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK information leaks in mutable variables (6657026,6657138)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3882" }, { "category": "external", "summary": "RHBZ#530175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530175" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3882", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3882" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3882", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3882" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK information leaks in mutable variables (6657026,6657138)" }, { "cve": "CVE-2009-3883", "discovery_date": "2009-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530175" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the Windows Pluggable Look and Feel (PL\u0026F) feature in the Swing implementation in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, have unknown impact and remote attack vectors, related to \"information leaks in mutable variables,\" aka Bug Id 6657138.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK information leaks in mutable variables (6657026,6657138)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3883" }, { "category": "external", "summary": "RHBZ#530175", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530175" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3883", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3883" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK information leaks in mutable variables (6657026,6657138)" }, { "cve": "CVE-2009-3884", "discovery_date": "2009-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530300" } ], "notes": [ { "category": "description", "text": "The TimeZone.getTimeZone method in Sun Java SE 5.0 before Update 22 and 6 before Update 17, and OpenJDK, allows remote attackers to determine the existence of local files via vectors related to handling of zoneinfo (aka tz) files, aka Bug Id 6824265.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK zoneinfo file existence information leak (6824265)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3884" }, { "category": "external", "summary": "RHBZ#530300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530300" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3884", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3884" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-11T13:42:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nRun the following commands to switch from Sun Java SE 5.0 to the Java 2\nTechnology Edition of the IBM Developer Kit for Linux:\n\n1) up2date -i java-1.5.0-ibm java-1.5.0-ibm-devel dwr\n\n2) service rhn-satellite stop\n\n3) alternatives --set java /usr/lib/jvm/jre-1.5.0-ibm/bin/java\n\n4) alternatives --set javac /usr/lib/jvm/java-1.5.0-ibm/bin/javac\n\n5) service rhn-satellite start", "product_ids": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1662" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-0:1.5.0.22-1jpp.1.el4.x86_64", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.i586", "4AS-RHNSAT5.1:java-1.5.0-sun-devel-0:1.5.0.22-1jpp.1.el4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK zoneinfo file existence information leak (6824265)" } ] }
rhsa-2009_1551
Vulnerability from csaf_redhat
Published
2009-11-04 15:14
Modified
2024-11-14 10:47
Summary
Red Hat Security Advisory: java-1.4.2-ibm security update
Notes
Topic
Updated java-1.4.2-ibm packages that fix two security issues are now
available for Red Hat Enterprise Linux 4 and 5 for SAP.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
The IBM 1.4.2 SR13-FP2 Java release includes the IBM Java 2 Runtime
Environment and the IBM Java 2 Software Development Kit.
This update fixes two vulnerabilities in the IBM Java 2 Runtime Environment
and the IBM Java 2 Software Development Kit. These vulnerabilities are
summarized on the IBM "Security alerts" page listed in the References
section. (CVE-2008-5349, CVE-2009-2625)
Warning: Do not install these java-1.4.2-ibm packages for SAP alongside the
java-1.4.2-ibm packages from the Red Hat Enterprise Linux Extras or
Supplementary channels on the Red Hat Network. Doing so could cause your
system to fail to update cleanly, among other possible problems.
All users of java-1.4.2-ibm for Red Hat Enterprise Linux 4 and 5 for SAP
are advised to upgrade to these updated packages, which contain the IBM
1.4.2 SR13-FP2 Java release. All running instances of IBM Java must be
restarted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.4.2-ibm packages that fix two security issues are now\navailable for Red Hat Enterprise Linux 4 and 5 for SAP.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The IBM 1.4.2 SR13-FP2 Java release includes the IBM Java 2 Runtime\nEnvironment and the IBM Java 2 Software Development Kit.\n\nThis update fixes two vulnerabilities in the IBM Java 2 Runtime Environment\nand the IBM Java 2 Software Development Kit. These vulnerabilities are\nsummarized on the IBM \"Security alerts\" page listed in the References\nsection. (CVE-2008-5349, CVE-2009-2625)\n\nWarning: Do not install these java-1.4.2-ibm packages for SAP alongside the\njava-1.4.2-ibm packages from the Red Hat Enterprise Linux Extras or\nSupplementary channels on the Red Hat Network. Doing so could cause your\nsystem to fail to update cleanly, among other possible problems.\n\nAll users of java-1.4.2-ibm for Red Hat Enterprise Linux 4 and 5 for SAP\nare advised to upgrade to these updated packages, which contain the IBM\n1.4.2 SR13-FP2 Java release. All running instances of IBM Java must be\nrestarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1551", "url": "https://access.redhat.com/errata/RHSA-2009:1551" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://www.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "472206", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=472206" }, { "category": "external", "summary": "512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1551.json" } ], "title": "Red Hat Security Advisory: java-1.4.2-ibm security update", "tracking": { "current_release_date": "2024-11-14T10:47:02+00:00", "generator": { "date": "2024-11-14T10:47:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2009:1551", "initial_release_date": "2009-11-04T15:14:00+00:00", "revision_history": [ { "date": "2009-11-04T15:14:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-11-04T10:14:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:47:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL 4 AS for SAP", "product": { "name": "RHEL 4 AS for SAP", "product_id": "4AS-SAP", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_sap:4" } } }, { "category": "product_name", "name": "RHEL 5 Server for SAP", "product": { "name": "RHEL 5 Server for SAP", "product_id": "5Server-SAP", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_sap:5" } } } ], "category": "product_family", "name": "RHEL for SAP" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.2.sap-1jpp.4.el4_8?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.2.sap-1jpp.4.el4_8?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.2.sap-1jpp.4.el4_8?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.2.sap-1jpp.4.el4_8?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.2.sap-1jpp.4.el4_8?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.2.sap-1jpp.4.el5_3?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.2.sap-1jpp.4.el5_3?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.2.sap-1jpp.4.el5_3?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.2.sap-1jpp.4.el5_3?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.2.sap-1jpp.4.el5_3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64 as a component of RHEL 4 AS for SAP", "product_id": "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "relates_to_product_reference": "4AS-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64 as a component of RHEL 4 AS for SAP", "product_id": "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "relates_to_product_reference": "4AS-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64 as a component of RHEL 4 AS for SAP", "product_id": "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "relates_to_product_reference": "4AS-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64 as a component of RHEL 4 AS for SAP", "product_id": "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "relates_to_product_reference": "4AS-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64 as a component of RHEL 4 AS for SAP", "product_id": "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "relates_to_product_reference": "4AS-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "relates_to_product_reference": "5Server-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "relates_to_product_reference": "5Server-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "relates_to_product_reference": "5Server-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "relates_to_product_reference": "5Server-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "relates_to_product_reference": "5Server-SAP" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-5349", "discovery_date": "2008-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "472206" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier, and JDK and JRE 5.0 Update 16 and earlier, allows remote attackers to cause a denial of service (CPU consumption) via a crafted RSA public key.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK RSA public key length denial-of-service (6497740)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-5349" }, { "category": "external", "summary": "RHBZ#472206", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=472206" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-5349", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5349" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5349", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5349" } ], "release_date": "2008-12-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-11-04T15:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1551" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK RSA public key length denial-of-service (6497740)" }, { "cve": "CVE-2009-1100", "discovery_date": "2009-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "492305" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allow remote attackers to cause a denial of service (disk consumption) via vectors related to temporary font files and (1) \"limits on Font creation,\" aka CR 6522586, and (2) another unspecified vector, aka CR 6632886.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: DoS (disk consumption) via handling of temporary font files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1100" }, { "category": "external", "summary": "RHBZ#492305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492305" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1100", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1100" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1100", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1100" } ], "release_date": "2009-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-11-04T15:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1551" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: DoS (disk consumption) via handling of temporary font files" }, { "cve": "CVE-2009-2625", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512921" } ], "notes": [ { "category": "description", "text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: XML parsing Denial-Of-Service (6845701)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2625" }, { "category": "external", "summary": "RHBZ#512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-11-04T15:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1551" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: XML parsing Denial-Of-Service (6845701)" }, { "cve": "CVE-2009-3868", "discovery_date": "2009-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "533215" } ], "notes": [ { "category": "description", "text": "Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 does not properly parse color profiles, which allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862970.", "title": "Vulnerability description" }, { "category": "summary", "text": "java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3868" }, { "category": "external", "summary": "RHBZ#533215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533215" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3868", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3868" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3868", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3868" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-11-04T15:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1551" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970)" }, { "cve": "CVE-2009-3872", "discovery_date": "2009-11-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "532906" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the JPEG JFIF Decoder in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862969.", "title": "Vulnerability description" }, { "category": "summary", "text": "JRE JPEG JFIF Decoder issue (6862969)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3872" }, { "category": "external", "summary": "RHBZ#532906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=532906" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3872", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3872" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3872", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3872" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-11-04T15:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1551" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JRE JPEG JFIF Decoder issue (6862969)" }, { "cve": "CVE-2009-3873", "discovery_date": "2009-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530053" } ], "notes": [ { "category": "description", "text": "The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a \"quantization problem,\" aka Bug Id 6862968.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK JPEG Image Writer quantization problem (6862968)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3873" }, { "category": "external", "summary": "RHBZ#530053", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530053" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3873", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3873" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3873", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3873" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-11-04T15:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1551" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK JPEG Image Writer quantization problem (6862968)" }, { "cve": "CVE-2009-3876", "discovery_date": "2009-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530061" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted DER encoded data, which is not properly decoded by the ASN.1 DER input stream parser, aka Bug Id 6864911.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3876" }, { "category": "external", "summary": "RHBZ#530061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3876", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3876" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3876", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3876" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-11-04T15:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1551" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877" }, { "cve": "CVE-2009-3877", "discovery_date": "2009-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530061" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3877" }, { "category": "external", "summary": "RHBZ#530061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3877", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3877" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3877", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3877" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-11-04T15:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1551" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-demo-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-devel-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-javacomm-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64", "5Server-SAP:java-1.4.2-ibm-src-0:1.4.2.13.2.sap-1jpp.4.el5_3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877" } ] }
rhsa-2009_1505
Vulnerability from csaf_redhat
Published
2009-10-14 16:08
Modified
2024-11-14 10:46
Summary
Red Hat Security Advisory: java-1.4.2-ibm security update
Notes
Topic
Updated java-1.4.2-ibm packages that fix two security issues are now
available for Red Hat Enterprise Linux 3 Extras, Red Hat Enterprise Linux 4
Extras, and Red Hat Enterprise Linux 5 Supplementary.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
The IBM 1.4.2 SR13-FP1 Java release includes the IBM Java 2 Runtime
Environment and the IBM Java 2 Software Development Kit.
This update fixes two vulnerabilities in the IBM Java 2 Runtime Environment
and the IBM Java 2 Software Development Kit. These vulnerabilities are
summarized on the IBM "Security alerts" page listed in the References
section. (CVE-2008-5349, CVE-2009-2625)
All users of java-1.4.2-ibm are advised to upgrade to these updated
packages, which contain the IBM 1.4.2 SR13-FP1 Java release. All running
instances of IBM Java must be restarted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.4.2-ibm packages that fix two security issues are now\navailable for Red Hat Enterprise Linux 3 Extras, Red Hat Enterprise Linux 4\nExtras, and Red Hat Enterprise Linux 5 Supplementary.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The IBM 1.4.2 SR13-FP1 Java release includes the IBM Java 2 Runtime\nEnvironment and the IBM Java 2 Software Development Kit.\n\nThis update fixes two vulnerabilities in the IBM Java 2 Runtime Environment\nand the IBM Java 2 Software Development Kit. These vulnerabilities are\nsummarized on the IBM \"Security alerts\" page listed in the References\nsection. (CVE-2008-5349, CVE-2009-2625)\n\nAll users of java-1.4.2-ibm are advised to upgrade to these updated\npackages, which contain the IBM 1.4.2 SR13-FP1 Java release. All running\ninstances of IBM Java must be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1505", "url": "https://access.redhat.com/errata/RHSA-2009:1505" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://www.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "472206", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=472206" }, { "category": "external", "summary": "512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1505.json" } ], "title": "Red Hat Security Advisory: java-1.4.2-ibm security update", "tracking": { "current_release_date": "2024-11-14T10:46:39+00:00", "generator": { "date": "2024-11-14T10:46:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2009:1505", "initial_release_date": "2009-10-14T16:08:00+00:00", "revision_history": [ { "date": "2009-10-14T16:08:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-10-14T12:08:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:46:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:3" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3 Extras", "product": { "name": "Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:3" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:3" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:3" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "product": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "product_id": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-plugin@1.4.2.13.1-1jpp.1.el3?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.1-1jpp.1.el3?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.1-1jpp.1.el3?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "product_id": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.1-1jpp.1.el3?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.1-1jpp.1.el3?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.1-1jpp.1.el3?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.1-1jpp.1.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "product": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "product_id": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-plugin@1.4.2.13.1-1jpp.1.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.1-1jpp.1.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.1-1jpp.1.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "product_id": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.1-1jpp.1.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.1-1jpp.1.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.1-1jpp.1.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.i386", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.i386", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.1-1jpp.1.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.i386", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.i386", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.1-1jpp.1.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el5.i386", "product": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el5.i386", "product_id": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-plugin@1.4.2.13.1-1jpp.1.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.i386", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.i386", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.1-1jpp.1.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.i386", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.i386", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.1-1jpp.1.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.i386", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.i386", "product_id": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.1-1jpp.1.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.i386", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.i386", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.1-1jpp.1.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.1-1jpp.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.1-1jpp.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.1-1jpp.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.1-1jpp.1.el3?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.1-1jpp.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.1-1jpp.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.1-1jpp.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.1-1jpp.1.el4?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ia64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ia64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.1-1jpp.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ia64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ia64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.1-1jpp.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ia64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ia64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.1-1jpp.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ia64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ia64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.1-1jpp.1.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.1-1jpp.1.el3?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.1-1jpp.1.el3?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.1-1jpp.1.el3?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.1-1jpp.1.el3?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.1-1jpp.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.1-1jpp.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.1-1jpp.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.1-1jpp.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.1-1jpp.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.x86_64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.1-1jpp.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.1-1jpp.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.x86_64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.1-1jpp.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.1-1jpp.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.x86_64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.1-1jpp.1.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.1-1jpp.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.1-1jpp.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "product_id": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.1-1jpp.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.1-1jpp.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.1-1jpp.1.el3?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.1-1jpp.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.1-1jpp.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.1-1jpp.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "product_id": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.1-1jpp.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.1-1jpp.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.1-1jpp.1.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.1-1jpp.1.el5?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.1-1jpp.1.el5?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.1-1jpp.1.el5?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.ppc", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.ppc", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.1-1jpp.1.el5?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc", "product_id": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.1-1jpp.1.el5?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.1-1jpp.1.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.1-1jpp.1.el3?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "product_id": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.1-1jpp.1.el3?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.1-1jpp.1.el3?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.1-1jpp.1.el3?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.1-1jpp.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "product_id": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.1-1jpp.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.1-1jpp.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.1-1jpp.1.el4?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390x", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390x", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.1-1jpp.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390x", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390x", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.1-1jpp.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390x", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390x", "product_id": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.1-1jpp.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390x", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390x", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.1-1jpp.1.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.1-1jpp.1.el3?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.1-1jpp.1.el3?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "product_id": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.1-1jpp.1.el3?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.1-1jpp.1.el3?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.1-1jpp.1.el3?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.1-1jpp.1.el4?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.1-1jpp.1.el4?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "product_id": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.1-1jpp.1.el4?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.1-1jpp.1.el4?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.1-1jpp.1.el4?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.1-1jpp.1.el5?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.1-1jpp.1.el5?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.s390", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.s390", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.1-1jpp.1.el5?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390", "product_id": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.1-1jpp.1.el5?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.1-1jpp.1.el5?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.1-1jpp.1.el4?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.1-1jpp.1.el4?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.1-1jpp.1.el4?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.1-1jpp.1.el4?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.1-1jpp.1.el4?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.1-1jpp.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.1-1jpp.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.1-1jpp.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.1-1jpp.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.1-1jpp.1.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64 as a component of Red Hat Enterprise Linux AS version 3 Extras", "product_id": "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "relates_to_product_reference": "3AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64 as a component of Red Hat Desktop version 3 Extras", "product_id": "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "relates_to_product_reference": "3Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64 as a component of Red Hat Enterprise Linux ES version 3 Extras", "product_id": "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "relates_to_product_reference": "3ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64 as a component of Red Hat Enterprise Linux WS version 3 Extras", "product_id": "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "relates_to_product_reference": "3WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ia64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ia64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ia64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ia64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ia64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ia64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ia64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ia64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2008-5349", "discovery_date": "2008-11-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "472206" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Java Runtime Environment (JRE) for Sun JDK and JRE 6 Update 10 and earlier, and JDK and JRE 5.0 Update 16 and earlier, allows remote attackers to cause a denial of service (CPU consumption) via a crafted RSA public key.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK RSA public key length denial-of-service (6497740)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2008-5349" }, { "category": "external", "summary": "RHBZ#472206", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=472206" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2008-5349", "url": "https://www.cve.org/CVERecord?id=CVE-2008-5349" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2008-5349", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5349" } ], "release_date": "2008-12-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-10-14T16:08:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1505" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK RSA public key length denial-of-service (6497740)" }, { "cve": "CVE-2009-2625", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512921" } ], "notes": [ { "category": "description", "text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: XML parsing Denial-Of-Service (6845701)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2625" }, { "category": "external", "summary": "RHBZ#512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-10-14T16:08:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1505" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "3AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "3AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "3AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "3AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "3Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "3ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "3ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "3ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "3ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ia64", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.s390x", "3WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ia64", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.s390x", "3WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ia64", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.s390x", "3WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el3.x86_64", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.i386", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ia64", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.ppc", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.s390x", "3WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el3.x86_64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.1-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: XML parsing Denial-Of-Service (6845701)" } ] }
rhsa-2009_1236
Vulnerability from csaf_redhat
Published
2009-08-28 08:57
Modified
2024-11-14 10:46
Summary
Red Hat Security Advisory: java-1.5.0-ibm security update
Notes
Topic
Updated java-1.5.0-ibm packages that fix several security issues are now
available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
Details
The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment and
the IBM Java 2 Software Development Kit.
This update fixes several vulnerabilities in the IBM Java 2 Runtime
Environment and the IBM Java 2 Software Development Kit. These
vulnerabilities are summarized on the IBM "Security alerts" page listed in
the References section. (CVE-2009-2625, CVE-2009-2670, CVE-2009-2671,
CVE-2009-2672, CVE-2009-2673, CVE-2009-2675)
All users of java-1.5.0-ibm are advised to upgrade to these updated
packages, containing the IBM 1.5.0 SR10 Java release. All running instances
of IBM Java must be restarted for this update to take effect.
Note: The packages included in this update are identical to the packages
made available by RHEA-2009:1208 and RHEA-2009:1210 on the 13th of
August 2009. These packages are being reissued as a Red Hat Security
Advisory as they fixed a number of security issues that were not made
public until after those errata were released. Since the packages are
identical, there is no need to install this update if RHEA-2009:1208 or
RHEA-2009:1210 has already been installed.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.5.0-ibm packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment and\nthe IBM Java 2 Software Development Kit.\n\nThis update fixes several vulnerabilities in the IBM Java 2 Runtime\nEnvironment and the IBM Java 2 Software Development Kit. These\nvulnerabilities are summarized on the IBM \"Security alerts\" page listed in\nthe References section. (CVE-2009-2625, CVE-2009-2670, CVE-2009-2671,\nCVE-2009-2672, CVE-2009-2673, CVE-2009-2675)\n\nAll users of java-1.5.0-ibm are advised to upgrade to these updated\npackages, containing the IBM 1.5.0 SR10 Java release. All running instances\nof IBM Java must be restarted for this update to take effect.\n\nNote: The packages included in this update are identical to the packages\nmade available by RHEA-2009:1208 and RHEA-2009:1210 on the 13th of\nAugust 2009. These packages are being reissued as a Red Hat Security\nAdvisory as they fixed a number of security issues that were not made\npublic until after those errata were released. Since the packages are\nidentical, there is no need to install this update if RHEA-2009:1208 or\nRHEA-2009:1210 has already been installed.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1236", "url": "https://access.redhat.com/errata/RHSA-2009:1236" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "512896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896" }, { "category": "external", "summary": "512907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907" }, { "category": "external", "summary": "512914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914" }, { "category": "external", "summary": "512920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920" }, { "category": "external", "summary": "512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1236.json" } ], "title": "Red Hat Security Advisory: java-1.5.0-ibm security update", "tracking": { "current_release_date": "2024-11-14T10:46:26+00:00", "generator": { "date": "2024-11-14T10:46:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2009:1236", "initial_release_date": "2009-08-28T08:57:00+00:00", "revision_history": [ { "date": "2009-08-28T08:57:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-08-28T04:57:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:46:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "product": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.10-1jpp.4.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.10-1jpp.4.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.10-1jpp.4.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "product": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.10-1jpp.4.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.10-1jpp.4.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.10-1jpp.4.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "product": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.10-1jpp.4.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "product": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.10-1jpp.4.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.10-1jpp.4.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.10-1jpp.4.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el4?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.10-1jpp.4.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.10-1jpp.4.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el4?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "product": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "product": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.10-1jpp.4.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.10-1jpp.4.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.10-1jpp.4.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.10-1jpp.4.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "product": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.10-1jpp.4.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.10-1jpp.4.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.10-1jpp.4.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el4?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "product": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "product": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.10-1jpp.4.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "product": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "product": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.10-1jpp.4.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "product": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "product_id": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.10-1jpp.4.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "product_id": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.10-1jpp.4.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.10-1jpp.4.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.10-1jpp.4.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.10-1jpp.4.el4?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-2625", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512921" } ], "notes": [ { "category": "description", "text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: XML parsing Denial-Of-Service (6845701)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2625" }, { "category": "external", "summary": "RHBZ#512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-28T08:57:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: XML parsing Denial-Of-Service (6845701)" }, { "cve": "CVE-2009-2670", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512896" } ], "notes": [ { "category": "description", "text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Untrusted applet System properties access (6738524)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2670" }, { "category": "external", "summary": "RHBZ#512896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2670" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-28T08:57:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK Untrusted applet System properties access (6738524)" }, { "cve": "CVE-2009-2671", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512907" } ], "notes": [ { "category": "description", "text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Proxy mechanism information leaks (6801071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2671" }, { "category": "external", "summary": "RHBZ#512907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2671" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-28T08:57:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Proxy mechanism information leaks (6801071)" }, { "cve": "CVE-2009-2672", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512907" } ], "notes": [ { "category": "description", "text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Proxy mechanism information leaks (6801071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2672" }, { "category": "external", "summary": "RHBZ#512907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-28T08:57:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Proxy mechanism information leaks (6801071)" }, { "cve": "CVE-2009-2673", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512914" } ], "notes": [ { "category": "description", "text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2673" }, { "category": "external", "summary": "RHBZ#512914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2673" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-28T08:57:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)" }, { "cve": "CVE-2009-2675", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512920" } ], "notes": [ { "category": "description", "text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2675" }, { "category": "external", "summary": "RHBZ#512920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-28T08:57:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1236" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.10-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.10-1jpp.4.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)" } ] }
rhsa-2009_1650
Vulnerability from csaf_redhat
Published
2009-12-10 00:03
Modified
2024-12-15 18:16
Summary
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0.CP08 update
Notes
Topic
Updated JBoss Enterprise Application Platform (JBEAP) 4.2 packages that fix
multiple security issues, several bugs, and add enhancements are now
available for Red Hat Enterprise Linux 5 as JBEAP 4.2.0.CP08.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
JBoss Enterprise Application Platform is the market leading platform for
innovative and scalable Java applications; integrating the JBoss
Application Server, with JBoss Hibernate and JBoss Seam into a complete,
simple enterprise solution.
This release of JBEAP for Red Hat Enterprise Linux 5 serves as a
replacement to JBEAP 4.2.0.CP07.
These updated packages include bug fixes and enhancements which are
detailed in the Release Notes, available shortly from:
http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/
The following security issues are also fixed with this release:
A missing check for the recommended minimum length of the truncated form of
HMAC-based XML signatures was found in xml-security. An attacker could use
this flaw to create a specially-crafted XML file that forges an XML
signature, allowing the attacker to bypass authentication that is based on
the XML Signature specification. (CVE-2009-0217)
Swatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss
Application Server Web Console. An attacker could use these flaws to
present misleading data to an authenticated user, or execute arbitrary
scripting code in the context of the authenticated user's browser session.
(CVE-2009-2405)
A flaw was found in the way the Apache Xerces2 Java Parser processed the
SYSTEM identifier in DTDs. A remote attacker could provide a
specially-crafted XML file, which once parsed by an application using the
Apache Xerces2 Java Parser, would lead to a denial of service (application
hang due to excessive CPU use). (CVE-2009-2625)
An information leak flaw was found in the twiddle command line client. The
JMX password was logged in plain text to "twiddle.log". (CVE-2009-3554)
An XSS flaw was found in the JMX Console. An attacker could use this flaw
to present misleading data to an authenticated user, or execute arbitrary
scripting code in the context of the authenticated user's browser session.
(CVE-2009-1380)
Warning: Before applying this update, please backup the JBEAP
"server/[configuration]/deploy/" directory, and any other customized
configuration files.
All users of JBEAP 4.2 on Red Hat Enterprise Linux 5 are advised to upgrade
to these updated packages.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.2 packages that fix\nmultiple security issues, several bugs, and add enhancements are now\navailable for Red Hat Enterprise Linux 5 as JBEAP 4.2.0.CP08.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 5 serves as a\nreplacement to JBEAP 4.2.0.CP07.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the Release Notes, available shortly from:\nhttp://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/\n\nThe following security issues are also fixed with this release:\n\nA missing check for the recommended minimum length of the truncated form of\nHMAC-based XML signatures was found in xml-security. An attacker could use\nthis flaw to create a specially-crafted XML file that forges an XML\nsignature, allowing the attacker to bypass authentication that is based on\nthe XML Signature specification. (CVE-2009-0217)\n\nSwatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss\nApplication Server Web Console. An attacker could use these flaws to\npresent misleading data to an authenticated user, or execute arbitrary\nscripting code in the context of the authenticated user\u0027s browser session.\n(CVE-2009-2405)\n\nA flaw was found in the way the Apache Xerces2 Java Parser processed the\nSYSTEM identifier in DTDs. A remote attacker could provide a\nspecially-crafted XML file, which once parsed by an application using the\nApache Xerces2 Java Parser, would lead to a denial of service (application\nhang due to excessive CPU use). (CVE-2009-2625)\n\nAn information leak flaw was found in the twiddle command line client. The\nJMX password was logged in plain text to \"twiddle.log\". (CVE-2009-3554)\n\nAn XSS flaw was found in the JMX Console. An attacker could use this flaw\nto present misleading data to an authenticated user, or execute arbitrary\nscripting code in the context of the authenticated user\u0027s browser session.\n(CVE-2009-1380)\n\nWarning: Before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.2 on Red Hat Enterprise Linux 5 are advised to upgrade\nto these updated packages.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1650", "url": "https://access.redhat.com/errata/RHSA-2009:1650" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/", "url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/" }, { "category": "external", "summary": "510023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510023" }, { "category": "external", "summary": "511224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511224" }, { "category": "external", "summary": "511915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915" }, { "category": "external", "summary": "512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "532111", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=532111" }, { "category": "external", "summary": "539495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539495" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1650.json" } ], "title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0.CP08 update", "tracking": { "current_release_date": "2024-12-15T18:16:32+00:00", "generator": { "date": "2024-12-15T18:16:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2009:1650", "initial_release_date": "2009-12-10T00:03:00+00:00", "revision_history": [ { "date": "2009-12-10T00:03:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-12-09T19:03:48+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-15T18:16:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "jgroups-1:2.4.7-1.ep1.el5.src", "product": { "name": "jgroups-1:2.4.7-1.ep1.el5.src", "product_id": "jgroups-1:2.4.7-1.ep1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jgroups@2.4.7-1.ep1.el5?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "product": { "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "product_id": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-remoting@2.2.3-3.SP1.ep1.el5?arch=src" } } }, { "category": "product_version", "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "product": { "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "product_id": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "product": { "name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "product_id": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations@3.3.1-1.11GA_CP02.ep1.el5?arch=src" } } }, { "category": "product_version", "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "product": { "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "product_id": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP08.1jpp.ep1.1.el5?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "product": { "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "product_id": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP12.0jpp.ep1.2.el5?arch=src" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "product": { "name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "product_id": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.3.2-2.5.1.ep1.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-seam-0:1.2.1-1.ep1.14.el5.src", "product": { "name": "jboss-seam-0:1.2.1-1.ep1.14.el5.src", "product_id": "jboss-seam-0:1.2.1-1.ep1.14.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.14.el5?arch=src" } } }, { "category": "product_version", "name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src", "product": { "name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src", "product_id": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-6.GA_CP08.ep1.3.el5?arch=src" } } }, { "category": "product_version", "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "product": { "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "product_id": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/quartz@1.5.2-1jpp.patch01.ep1.4.1.el5?arch=src" } } }, { "category": "product_version", "name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "product": { "name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "product_id": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jacorb@2.3.0-1jpp.ep1.9.1.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "product": { "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "product_id": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common@1.2.1-0jpp.ep1.3.el5.1?arch=src" } } }, { "category": "product_version", "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "product": { "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "product_id": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-aop@1.5.5-3.CP04.2.ep1.el5?arch=src" } } }, { "category": "product_version", "name": "jcommon-0:1.0.16-1.1.ep1.el5.src", "product": { "name": "jcommon-0:1.0.16-1.1.ep1.el5.src", "product_id": "jcommon-0:1.0.16-1.1.ep1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jcommon@1.0.16-1.1.ep1.el5?arch=src" } } }, { "category": "product_version", "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "product": { "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "product_id": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.1.ep1.el5?arch=src" } } }, { "category": "product_version", "name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "product": { "name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "product_id": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.1.ep1.el5?arch=src" } } }, { "category": "product_version", "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src", "product": { "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src", "product_id": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-security@1.3.0-1.3.patch01.ep1.2.1.el5?arch=src" } } }, { "category": "product_version", "name": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src", "product": { "name": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src", "product_id": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas@4.2.0-5.GA_CP08.5.2.ep1.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jgroups-1:2.4.7-1.ep1.el5.noarch", "product": { "name": "jgroups-1:2.4.7-1.ep1.el5.noarch", "product_id": "jgroups-1:2.4.7-1.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jgroups@2.4.7-1.ep1.el5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "product": { "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "product_id": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-remoting@2.2.3-3.SP1.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "product": { "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "product": { "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "product_id": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "product": { "name": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "product_id": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.3.1-1.11GA_CP02.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "product": { "name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "product_id": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations@3.3.1-1.11GA_CP02.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "product": { "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "product_id": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP08.1jpp.ep1.1.el5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "product": { "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "product_id": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP12.0jpp.ep1.2.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "product": { "name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "product_id": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.3.2-2.5.1.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "product": { "name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "product_id": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.3.2-2.5.1.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch", "product": { "name": "jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch", "product_id": "jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-1.ep1.14.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-seam-0:1.2.1-1.ep1.14.el5.noarch", "product": { "name": "jboss-seam-0:1.2.1-1.ep1.14.el5.noarch", "product_id": "jboss-seam-0:1.2.1-1.ep1.14.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.14.el5?arch=noarch" } } }, { "category": "product_version", "name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "product": { "name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "product_id": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-6.GA_CP08.ep1.3.el5?arch=noarch" } } }, { "category": "product_version", "name": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "product": { "name": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "product_id": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-eap-docs-examples@4.2.0-6.GA_CP08.ep1.3.el5?arch=noarch" } } }, { "category": "product_version", "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "product": { "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "product_id": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/quartz@1.5.2-1jpp.patch01.ep1.4.1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "product": { "name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "product_id": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jacorb@2.3.0-1jpp.ep1.9.1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "product": { "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "product_id": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common@1.2.1-0jpp.ep1.3.el5.1?arch=noarch" } } }, { "category": "product_version", "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "product": { "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "product_id": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-aop@1.5.5-3.CP04.2.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jcommon-0:1.0.16-1.1.ep1.el5.noarch", "product": { "name": "jcommon-0:1.0.16-1.1.ep1.el5.noarch", "product_id": "jcommon-0:1.0.16-1.1.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jcommon@1.0.16-1.1.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "product": { "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "product_id": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.1.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "product": { "name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "product_id": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.1.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "product": { "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "product_id": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-security@1.3.0-1.3.patch01.ep1.2.1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "product": { "name": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "product_id": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-4.2.0.GA_CP08-bin@4.2.0-5.GA_CP08.5.2.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "product": { "name": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "product_id": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas@4.2.0-5.GA_CP08.5.2.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "product": { "name": "jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "product_id": "jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-client@4.2.0-5.GA_CP08.5.2.ep1.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch" }, "product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src" }, "product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch" }, "product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src" }, "product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch" }, "product_reference": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src" }, "product_reference": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch" }, "product_reference": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch" }, "product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src" }, "product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch" }, "product_reference": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch" }, "product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch" }, "product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src" }, "product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch" }, "product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src" }, "product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch" }, "product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src" }, "product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch" }, "product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src" }, "product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-0:1.2.1-1.ep1.14.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch" }, "product_reference": "jboss-seam-0:1.2.1-1.ep1.14.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-0:1.2.1-1.ep1.14.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src" }, "product_reference": "jboss-seam-0:1.2.1-1.ep1.14.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch" }, "product_reference": "jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch" }, "product_reference": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src" }, "product_reference": "jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch" }, "product_reference": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch" }, "product_reference": "jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch" }, "product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src" }, "product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch" }, "product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src" }, "product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jcommon-0:1.0.16-1.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch" }, "product_reference": "jcommon-0:1.0.16-1.1.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jcommon-0:1.0.16-1.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src" }, "product_reference": "jcommon-0:1.0.16-1.1.ep1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch" }, "product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src" }, "product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jgroups-1:2.4.7-1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch" }, "product_reference": "jgroups-1:2.4.7-1.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jgroups-1:2.4.7-1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src" }, "product_reference": "jgroups-1:2.4.7-1.ep1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch" }, "product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src" }, "product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch" }, "product_reference": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src" }, "product_reference": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch" }, "product_reference": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch" }, "product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" }, "product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0217", "discovery_date": "2009-07-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "511915" } ], "notes": [ { "category": "description", "text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0217" }, { "category": "external", "summary": "RHBZ#511915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0217" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217" } ], "release_date": "2009-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-10T00:03:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1650" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass" }, { "cve": "CVE-2009-1380", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2009-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "511224" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in JMX-Console in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 allows remote attackers to inject arbitrary web script or HTML via the filter parameter, related to the key property and the position of quote and colon characters.", "title": "Vulnerability description" }, { "category": "summary", "text": "jbossas JMX-Console cross-site-scripting in filter parameter", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1380" }, { "category": "external", "summary": "RHBZ#511224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511224" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1380", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1380" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1380", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1380" } ], "release_date": "2009-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-10T00:03:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1650" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jbossas JMX-Console cross-site-scripting in filter parameter" }, { "cve": "CVE-2009-2405", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2009-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "510023" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) vulnerabilities in the Web Console in the Application Server in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2.0 before 4.2.0.CP08, 4.2.2GA, 4.3 before 4.3.0.CP07, and 5.1.0GA allow remote attackers to inject arbitrary web script or HTML via the (1) monitorName, (2) objectName, (3) attribute, or (4) period parameter to createSnapshot.jsp, or the (5) monitorName, (6) objectName, (7) attribute, (8) threshold, (9) period, or (10) enabled parameter to createThresholdMonitor.jsp. NOTE: some of these details are obtained from third party information.", "title": "Vulnerability description" }, { "category": "summary", "text": "JBoss Application Server Web Console XSS", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw does not affect Red Hat JBoss Enterprise Application Platform 5 or 6. Older versions of the community JBoss Application Server 5.x may be affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2405" }, { "category": "external", "summary": "RHBZ#510023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2405", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2405" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2405", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2405" } ], "release_date": "2009-07-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-10T00:03:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1650" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JBoss Application Server Web Console XSS" }, { "cve": "CVE-2009-2625", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512921" } ], "notes": [ { "category": "description", "text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: XML parsing Denial-Of-Service (6845701)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2625" }, { "category": "external", "summary": "RHBZ#512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-10T00:03:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1650" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: XML parsing Denial-Of-Service (6845701)" }, { "cve": "CVE-2009-3554", "discovery_date": "2009-10-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "539495" } ], "notes": [ { "category": "description", "text": "Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.", "title": "Vulnerability description" }, { "category": "summary", "text": "JBoss EAP Twiddle logs the JMX password", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3554" }, { "category": "external", "summary": "RHBZ#539495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539495" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3554", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3554" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3554", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3554" } ], "release_date": "2009-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-10T00:03:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1650" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.2.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.2.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.2.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jboss-seam-0:1.2.1-1.ep1.14.el5.src", "5Server-JBEAP-4.2.0:jboss-seam-docs-0:1.2.1-1.ep1.14.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-0:4.2.0-5.GA_CP08.5.2.ep1.el5.src", "5Server-JBEAP-4.2.0:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossas-client-0:4.2.0-5.GA_CP08.5.2.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.2.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.2.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el5.src", "5Server-JBEAP-4.2.0:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.2.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JBoss EAP Twiddle logs the JMX password" } ] }
rhsa-2012_1537
Vulnerability from csaf_redhat
Published
2012-12-04 18:59
Modified
2024-11-14 10:50
Summary
Red Hat Security Advisory: jasperreports-server-pro security and bug fix update
Notes
Topic
An updated jasperreports-server-pro package that fixes one security issue
and various bugs is now available.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
JasperReports Server is a reporting server.
A flaw was found in the way the Apache Xerces2 Java Parser processed the
SYSTEM identifier in DTDs. A remote attacker could provide a
specially-crafted XML file, which once parsed by an application using the
Apache Xerces2 Java Parser, would lead to a denial of service (application
hang due to excessive CPU use). (CVE-2009-2625)
This update also fixes the following bugs:
* Adding a user to any ROLE caused an unexpected exception. (BZ#730712)
* Previously, the jasperreports-server-pro RPM spec file contained the
"%{dist}" tag on the "Release" line. To comply with the packaging and
naming guidelines, the tag has been changed to "%{?dist}" with this update.
(BZ#868927)
* In some cases reports were opened with an incorrect list of
Entity/Entities. (BZ#842687)
Note: The jasperreports-server-pro package replaces rhevm-reports-server
from Red Hat Enterprise Virtualization Manager 3.0.
Users are advised to upgrade to this updated package, which corrects these
issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated jasperreports-server-pro package that fixes one security issue\nand various bugs is now available.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "JasperReports Server is a reporting server.\n\nA flaw was found in the way the Apache Xerces2 Java Parser processed the\nSYSTEM identifier in DTDs. A remote attacker could provide a\nspecially-crafted XML file, which once parsed by an application using the\nApache Xerces2 Java Parser, would lead to a denial of service (application\nhang due to excessive CPU use). (CVE-2009-2625)\n\nThis update also fixes the following bugs:\n\n* Adding a user to any ROLE caused an unexpected exception. (BZ#730712)\n\n* Previously, the jasperreports-server-pro RPM spec file contained the\n\"%{dist}\" tag on the \"Release\" line. To comply with the packaging and\nnaming guidelines, the tag has been changed to \"%{?dist}\" with this update.\n(BZ#868927)\n\n* In some cases reports were opened with an incorrect list of\nEntity/Entities. (BZ#842687)\n\nNote: The jasperreports-server-pro package replaces rhevm-reports-server\nfrom Red Hat Enterprise Virtualization Manager 3.0.\n\nUsers are advised to upgrade to this updated package, which corrects these\nissues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:1537", "url": "https://access.redhat.com/errata/RHSA-2012:1537" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "842687", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=842687" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_1537.json" } ], "title": "Red Hat Security Advisory: jasperreports-server-pro security and bug fix update", "tracking": { "current_release_date": "2024-11-14T10:50:35+00:00", "generator": { "date": "2024-11-14T10:50:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2012:1537", "initial_release_date": "2012-12-04T18:59:00+00:00", "revision_history": [ { "date": "2012-12-04T18:59:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-12-04T19:08:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:50:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEV-M for Servers", "product": { "name": "RHEV-M for Servers", "product_id": "6Server-RHEV-S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhev_manager:3" } } } ], "category": "product_family", "name": "Red Hat Virtualization" }, { "branches": [ { "category": "product_version", "name": "jasperreports-server-pro-0:4.7.1-2.el6ev.noarch", "product": { "name": "jasperreports-server-pro-0:4.7.1-2.el6ev.noarch", "product_id": "jasperreports-server-pro-0:4.7.1-2.el6ev.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jasperreports-server-pro@4.7.1-2.el6ev?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "jasperreports-server-pro-0:4.7.1-2.el6ev.src", "product": { "name": "jasperreports-server-pro-0:4.7.1-2.el6ev.src", "product_id": "jasperreports-server-pro-0:4.7.1-2.el6ev.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jasperreports-server-pro@4.7.1-2.el6ev?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jasperreports-server-pro-0:4.7.1-2.el6ev.noarch as a component of RHEV-M for Servers", "product_id": "6Server-RHEV-S:jasperreports-server-pro-0:4.7.1-2.el6ev.noarch" }, "product_reference": "jasperreports-server-pro-0:4.7.1-2.el6ev.noarch", "relates_to_product_reference": "6Server-RHEV-S" }, { "category": "default_component_of", "full_product_name": { "name": "jasperreports-server-pro-0:4.7.1-2.el6ev.src as a component of RHEV-M for Servers", "product_id": "6Server-RHEV-S:jasperreports-server-pro-0:4.7.1-2.el6ev.src" }, "product_reference": "jasperreports-server-pro-0:4.7.1-2.el6ev.src", "relates_to_product_reference": "6Server-RHEV-S" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-2625", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512921" } ], "notes": [ { "category": "description", "text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: XML parsing Denial-Of-Service (6845701)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHEV-S:jasperreports-server-pro-0:4.7.1-2.el6ev.noarch", "6Server-RHEV-S:jasperreports-server-pro-0:4.7.1-2.el6ev.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2625" }, { "category": "external", "summary": "RHBZ#512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-12-04T18:59:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/knowledge/articles/11258", "product_ids": [ "6Server-RHEV-S:jasperreports-server-pro-0:4.7.1-2.el6ev.noarch", "6Server-RHEV-S:jasperreports-server-pro-0:4.7.1-2.el6ev.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:1537" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHEV-S:jasperreports-server-pro-0:4.7.1-2.el6ev.noarch", "6Server-RHEV-S:jasperreports-server-pro-0:4.7.1-2.el6ev.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: XML parsing Denial-Of-Service (6845701)" } ] }
rhsa-2009_1649
Vulnerability from csaf_redhat
Published
2009-12-09 23:51
Modified
2024-12-15 18:16
Summary
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP07 update
Notes
Topic
Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix
multiple security issues, several bugs, and add enhancements are now
available for Red Hat Enterprise Linux 5 as JBEAP 4.3.0.CP07.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
JBoss Enterprise Application Platform is the market leading platform for
innovative and scalable Java applications; integrating the JBoss
Application Server, with JBoss Hibernate and JBoss Seam into a complete,
simple enterprise solution.
This release of JBEAP for Red Hat Enterprise Linux 5 serves as a
replacement to JBEAP 4.3.0.CP06.
These updated packages include bug fixes and enhancements which are
detailed in the Release Notes, available shortly from:
http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/
The following security issues are also fixed with this release:
A missing check for the recommended minimum length of the truncated form of
HMAC-based XML signatures was found in xml-security. An attacker could use
this flaw to create a specially-crafted XML file that forges an XML
signature, allowing the attacker to bypass authentication that is based on
the XML Signature specification. (CVE-2009-0217)
Swatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss
Application Server Web Console. An attacker could use these flaws to
present misleading data to an authenticated user, or execute arbitrary
scripting code in the context of the authenticated user's browser session.
(CVE-2009-2405)
A flaw was found in the way the Apache Xerces2 Java Parser processed the
SYSTEM identifier in DTDs. A remote attacker could provide a
specially-crafted XML file, which once parsed by an application using the
Apache Xerces2 Java Parser, would lead to a denial of service (application
hang due to excessive CPU use). (CVE-2009-2625)
An information leak flaw was found in the twiddle command line client. The
JMX password was logged in plain text to "twiddle.log". (CVE-2009-3554)
An XSS flaw was found in the JMX Console. An attacker could use this flaw
to present misleading data to an authenticated user, or execute arbitrary
scripting code in the context of the authenticated user's browser session.
(CVE-2009-1380)
Warning: Before applying this update, please backup the JBEAP
"server/[configuration]/deploy/" directory, and any other customized
configuration files.
All users of JBEAP 4.3 on Red Hat Enterprise Linux 5 are advised to upgrade
to these updated packages.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.3 packages that fix\nmultiple security issues, several bugs, and add enhancements are now\navailable for Red Hat Enterprise Linux 5 as JBEAP 4.3.0.CP07.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 5 serves as a\nreplacement to JBEAP 4.3.0.CP06.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the Release Notes, available shortly from:\nhttp://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/\n\nThe following security issues are also fixed with this release:\n\nA missing check for the recommended minimum length of the truncated form of\nHMAC-based XML signatures was found in xml-security. An attacker could use\nthis flaw to create a specially-crafted XML file that forges an XML\nsignature, allowing the attacker to bypass authentication that is based on\nthe XML Signature specification. (CVE-2009-0217)\n\nSwatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss\nApplication Server Web Console. An attacker could use these flaws to\npresent misleading data to an authenticated user, or execute arbitrary\nscripting code in the context of the authenticated user\u0027s browser session.\n(CVE-2009-2405)\n\nA flaw was found in the way the Apache Xerces2 Java Parser processed the\nSYSTEM identifier in DTDs. A remote attacker could provide a\nspecially-crafted XML file, which once parsed by an application using the\nApache Xerces2 Java Parser, would lead to a denial of service (application\nhang due to excessive CPU use). (CVE-2009-2625)\n\nAn information leak flaw was found in the twiddle command line client. The\nJMX password was logged in plain text to \"twiddle.log\". (CVE-2009-3554)\n\nAn XSS flaw was found in the JMX Console. An attacker could use this flaw\nto present misleading data to an authenticated user, or execute arbitrary\nscripting code in the context of the authenticated user\u0027s browser session.\n(CVE-2009-1380)\n\nWarning: Before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.3 on Red Hat Enterprise Linux 5 are advised to upgrade\nto these updated packages.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1649", "url": "https://access.redhat.com/errata/RHSA-2009:1649" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/", "url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/" }, { "category": "external", "summary": "510023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510023" }, { "category": "external", "summary": "511224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511224" }, { "category": "external", "summary": "511915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915" }, { "category": "external", "summary": "512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "532113", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=532113" }, { "category": "external", "summary": "539495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539495" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1649.json" } ], "title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.3.0.CP07 update", "tracking": { "current_release_date": "2024-12-15T18:16:28+00:00", "generator": { "date": "2024-12-15T18:16:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2009:1649", "initial_release_date": "2009-12-09T23:51:00+00:00", "revision_history": [ { "date": "2009-12-09T23:51:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-12-09T18:51:47+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-15T18:16:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "jgroups-1:2.4.7-1.ep1.el5.src", "product": { "name": "jgroups-1:2.4.7-1.ep1.el5.src", "product_id": "jgroups-1:2.4.7-1.ep1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jgroups@2.4.7-1.ep1.el5?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "product": { "name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "product_id": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jacorb@2.3.0-1jpp.ep1.9.1.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "product": { "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "product_id": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-remoting@2.2.3-3.SP1.ep1.el5?arch=src" } } }, { "category": "product_version", "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "product": { "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "product_id": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "product": { "name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "product_id": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations@3.3.1-1.11GA_CP02.ep1.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src", "product": { "name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src", "product_id": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-3.SP3_CP09.4.ep1.el5?arch=src" } } }, { "category": "product_version", "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "product": { "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "product_id": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP08.1jpp.ep1.1.el5?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "product": { "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "product_id": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP12.0jpp.ep1.2.el5?arch=src" } } }, { "category": "product_version", "name": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src", "product": { "name": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src", "product_id": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1.12.patch03.1.ep1.el5?arch=src" } } }, { "category": "product_version", "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "product": { "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "product_id": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.1.ep1.el5?arch=src" } } }, { "category": "product_version", "name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src", "product": { "name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src", "product_id": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossws-common@1.0.0-2.GA_CP05.1.ep1.el5?arch=src" } } }, { "category": "product_version", "name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src", "product": { "name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src", "product_id": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-1.GA_CP05.1.ep1.el5?arch=src" } } }, { "category": "product_version", "name": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src", "product": { "name": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src", "product_id": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossws@2.0.1-4.SP2_CP07.2.1.ep1.el5?arch=src" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "product": { "name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "product_id": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.3.2-2.5.1.ep1.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src", "product": { "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src", "product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1?arch=src" } } }, { "category": "product_version", "name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src", "product": { "name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src", "product_id": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-6.GA_CP07.ep1.3.el5?arch=src" } } }, { "category": "product_version", "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "product": { "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "product_id": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/quartz@1.5.2-1jpp.patch01.ep1.4.1.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "product": { "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "product_id": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common@1.2.1-0jpp.ep1.3.el5.1?arch=src" } } }, { "category": "product_version", "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "product": { "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "product_id": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-aop@1.5.5-3.CP04.2.ep1.el5?arch=src" } } }, { "category": "product_version", "name": "jcommon-0:1.0.16-1.1.ep1.el5.src", "product": { "name": "jcommon-0:1.0.16-1.1.ep1.el5.src", "product_id": "jcommon-0:1.0.16-1.1.ep1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jcommon@1.0.16-1.1.ep1.el5?arch=src" } } }, { "category": "product_version", "name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "product": { "name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "product_id": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.1.ep1.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src", "product": { "name": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src", "product_id": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam2@2.0.2.FP-1.ep1.18.el5?arch=src" } } }, { "category": "product_version", "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src", "product": { "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src", "product_id": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-security@1.3.0-1.3.patch01.ep1.2.1.el5?arch=src" } } }, { "category": "product_version", "name": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src", "product": { "name": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src", "product_id": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas@4.3.0-6.GA_CP07.4.2.ep1.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jgroups-1:2.4.7-1.ep1.el5.noarch", "product": { "name": "jgroups-1:2.4.7-1.ep1.el5.noarch", "product_id": "jgroups-1:2.4.7-1.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jgroups@2.4.7-1.ep1.el5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "product": { "name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "product_id": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jacorb@2.3.0-1jpp.ep1.9.1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "product": { "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "product_id": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-remoting@2.2.3-3.SP1.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "product": { "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "product": { "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "product_id": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "product": { "name": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "product_id": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.3.1-1.11GA_CP02.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "product": { "name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "product_id": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations@3.3.1-1.11GA_CP02.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch", "product": { "name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch", "product_id": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-messaging@1.4.0-3.SP3_CP09.4.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "product": { "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "product_id": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP08.1jpp.ep1.1.el5?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "product": { "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "product_id": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP12.0jpp.ep1.2.el5?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "product": { "name": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "product_id": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jaxb-javadoc@2.1.4-1.12.patch03.1.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "product": { "name": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "product_id": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jaxb@2.1.4-1.12.patch03.1.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "product": { "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "product_id": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.1.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch", "product": { "name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch", "product_id": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossws-common@1.0.0-2.GA_CP05.1.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch", "product": { "name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch", "product_id": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossws-framework@2.0.1-1.GA_CP05.1.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "product": { "name": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "product_id": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossws@2.0.1-4.SP2_CP07.2.1.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "product": { "name": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "product_id": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossws-native42@2.0.1-4.SP2_CP07.2.1.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "product": { "name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "product_id": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.3.2-2.5.1.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "product": { "name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "product_id": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.3.2-2.5.1.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "product": { "name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "product_id": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1?arch=noarch" } } }, { "category": "product_version", "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "product": { "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "product_id": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam@1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1?arch=noarch" } } }, { "category": "product_version", "name": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "product": { "name": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "product_id": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-eap-docs-examples@4.3.0-6.GA_CP07.ep1.3.el5?arch=noarch" } } }, { "category": "product_version", "name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "product": { "name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "product_id": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-eap-docs@4.3.0-6.GA_CP07.ep1.3.el5?arch=noarch" } } }, { "category": "product_version", "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "product": { "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "product_id": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/quartz@1.5.2-1jpp.patch01.ep1.4.1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "product": { "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "product_id": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common@1.2.1-0jpp.ep1.3.el5.1?arch=noarch" } } }, { "category": "product_version", "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "product": { "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "product_id": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-aop@1.5.5-3.CP04.2.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jcommon-0:1.0.16-1.1.ep1.el5.noarch", "product": { "name": "jcommon-0:1.0.16-1.1.ep1.el5.noarch", "product_id": "jcommon-0:1.0.16-1.1.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jcommon@1.0.16-1.1.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "product": { "name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "product_id": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.1.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch", "product": { "name": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch", "product_id": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam2@2.0.2.FP-1.ep1.18.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch", "product": { "name": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch", "product_id": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam2-docs@2.0.2.FP-1.ep1.18.el5?arch=noarch" } } }, { "category": "product_version", "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "product": { "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "product_id": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-security@1.3.0-1.3.patch01.ep1.2.1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "product": { "name": "jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "product_id": "jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-client@4.3.0-6.GA_CP07.4.2.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "product": { "name": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "product_id": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas@4.3.0-6.GA_CP07.4.2.ep1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "product": { "name": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "product_id": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-4.3.0.GA_CP07-bin@4.3.0-6.GA_CP07.4.2.ep1.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch" }, "product_reference": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src" }, "product_reference": "glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch" }, "product_reference": "glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch" }, "product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src" }, "product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch" }, "product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src" }, "product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch" }, "product_reference": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src" }, "product_reference": "hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch" }, "product_reference": "hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch" }, "product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src" }, "product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch" }, "product_reference": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch" }, "product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch" }, "product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src" }, "product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch" }, "product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src" }, "product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch" }, "product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src" }, "product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch" }, "product_reference": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src" }, "product_reference": "jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch" }, "product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src" }, "product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch" }, "product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src" }, "product_reference": "jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch" }, "product_reference": "jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch" }, "product_reference": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src" }, "product_reference": "jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch" }, "product_reference": "jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch" }, "product_reference": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src" }, "product_reference": "jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch" }, "product_reference": "jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch" }, "product_reference": "jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch" }, "product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src" }, "product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch" }, "product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src" }, "product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch" }, "product_reference": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src" }, "product_reference": "jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch" }, "product_reference": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src" }, "product_reference": "jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch" }, "product_reference": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src" }, "product_reference": "jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch" }, "product_reference": "jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jcommon-0:1.0.16-1.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch" }, "product_reference": "jcommon-0:1.0.16-1.1.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jcommon-0:1.0.16-1.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src" }, "product_reference": "jcommon-0:1.0.16-1.1.ep1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch" }, "product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src" }, "product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jgroups-1:2.4.7-1.ep1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch" }, "product_reference": "jgroups-1:2.4.7-1.ep1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jgroups-1:2.4.7-1.ep1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src" }, "product_reference": "jgroups-1:2.4.7-1.ep1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch" }, "product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src" }, "product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch" }, "product_reference": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src" }, "product_reference": "rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch" }, "product_reference": "rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch" }, "product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" }, "product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0217", "discovery_date": "2009-07-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "511915" } ], "notes": [ { "category": "description", "text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src", "5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src", "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src", "5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0217" }, { "category": "external", "summary": "RHBZ#511915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0217" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217" } ], "release_date": "2009-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-09T23:51:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src", "5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src", "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src", "5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1649" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src", "5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src", "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src", "5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass" }, { "cve": "CVE-2009-1380", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2009-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "511224" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in JMX-Console in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 allows remote attackers to inject arbitrary web script or HTML via the filter parameter, related to the key property and the position of quote and colon characters.", "title": "Vulnerability description" }, { "category": "summary", "text": "jbossas JMX-Console cross-site-scripting in filter parameter", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src", "5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src", "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src", "5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1380" }, { "category": "external", "summary": "RHBZ#511224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511224" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1380", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1380" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1380", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1380" } ], "release_date": "2009-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-09T23:51:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src", "5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src", "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src", "5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1649" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src", "5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src", "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src", "5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jbossas JMX-Console cross-site-scripting in filter parameter" }, { "cve": "CVE-2009-2405", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2009-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "510023" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) vulnerabilities in the Web Console in the Application Server in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2.0 before 4.2.0.CP08, 4.2.2GA, 4.3 before 4.3.0.CP07, and 5.1.0GA allow remote attackers to inject arbitrary web script or HTML via the (1) monitorName, (2) objectName, (3) attribute, or (4) period parameter to createSnapshot.jsp, or the (5) monitorName, (6) objectName, (7) attribute, (8) threshold, (9) period, or (10) enabled parameter to createThresholdMonitor.jsp. NOTE: some of these details are obtained from third party information.", "title": "Vulnerability description" }, { "category": "summary", "text": "JBoss Application Server Web Console XSS", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw does not affect Red Hat JBoss Enterprise Application Platform 5 or 6. Older versions of the community JBoss Application Server 5.x may be affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src", "5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src", "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src", "5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2405" }, { "category": "external", "summary": "RHBZ#510023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2405", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2405" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2405", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2405" } ], "release_date": "2009-07-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-09T23:51:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src", "5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src", "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src", "5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1649" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src", "5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src", "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src", "5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JBoss Application Server Web Console XSS" }, { "cve": "CVE-2009-2625", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512921" } ], "notes": [ { "category": "description", "text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: XML parsing Denial-Of-Service (6845701)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src", "5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src", "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src", "5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2625" }, { "category": "external", "summary": "RHBZ#512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-09T23:51:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src", "5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src", "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src", "5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1649" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src", "5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src", "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src", "5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: XML parsing Denial-Of-Service (6845701)" }, { "cve": "CVE-2009-3554", "discovery_date": "2009-10-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "539495" } ], "notes": [ { "category": "description", "text": "Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.", "title": "Vulnerability description" }, { "category": "summary", "text": "JBoss EAP Twiddle logs the JMX password", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src", "5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src", "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src", "5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3554" }, { "category": "external", "summary": "RHBZ#539495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539495" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3554", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3554" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3554", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3554" } ], "release_date": "2009-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-09T23:51:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src", "5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src", "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src", "5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1649" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jaxb-0:2.1.4-1.12.patch03.1.ep1.el5.src", "5Server-JBEAP-4.3.0:glassfish-jaxb-javadoc-0:2.1.4-1.12.patch03.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:glassfish-jsf-0:1.2_13-2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-annotations-0:3.3.1-1.11GA_CP02.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-annotations-javadoc-0:3.3.1-1.11GA_CP02.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-0:3.3.2-2.5.1.ep1.el5.src", "5Server-JBEAP-4.3.0:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.2.4.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.noarch", "5Server-JBEAP-4.3.0:jacorb-0:2.3.0-1jpp.ep1.9.1.el5.src", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-aop-0:1.5.5-3.CP04.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-common-0:1.2.1-0jpp.ep1.3.el5.1.src", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-messaging-0:1.4.0-3.SP3_CP09.4.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jboss-remoting-0:2.2.3-3.SP1.ep1.el5.src", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.src", "5Server-JBEAP-4.3.0:jboss-seam-docs-0:1.2.1-3.JBPAPP_4_3_0_GA.ep1.12.el5.1.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jboss-seam2-0:2.0.2.FP-1.ep1.18.el5.src", "5Server-JBEAP-4.3.0:jboss-seam2-docs-0:2.0.2.FP-1.ep1.18.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-0:4.3.0-6.GA_CP07.4.2.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossas-4.3.0.GA_CP07-bin-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossas-client-0:4.3.0-6.GA_CP07.4.2.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el5.src", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el5.src", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-common-0:1.0.0-2.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jbossws-framework-0:2.0.1-1.GA_CP05.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jbossws-native42-0:2.0.1-4.SP2_CP07.2.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jcommon-0:1.0.16-1.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jfreechart-0:1.0.13-2.3.1.ep1.el5.src", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.noarch", "5Server-JBEAP-4.3.0:jgroups-1:2.4.7-1.ep1.el5.src", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.noarch", "5Server-JBEAP-4.3.0:quartz-0:1.5.2-1jpp.patch01.ep1.4.1.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:rh-eap-docs-0:4.3.0-6.GA_CP07.ep1.3.el5.src", "5Server-JBEAP-4.3.0:rh-eap-docs-examples-0:4.3.0-6.GA_CP07.ep1.3.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.noarch", "5Server-JBEAP-4.3.0:xml-security-0:1.3.0-1.3.patch01.ep1.2.1.el5.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JBoss EAP Twiddle logs the JMX password" } ] }
rhsa-2012_0725
Vulnerability from csaf_redhat
Published
2012-06-12 23:19
Modified
2024-11-14 10:50
Summary
Red Hat Security Advisory: JBoss Operations Network 3.1.0 update
Notes
Topic
JBoss Operations Network 3.1.0, which fixes one security issue, several
bugs, and adds enhancements, is now available from the Red Hat Customer
Portal.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
JBoss Operations Network (JBoss ON) is a middleware management solution
that provides a single point of control to deploy, manage, and monitor
JBoss Enterprise Middleware, applications, and services.
This JBoss ON 3.1.0 release serves as a replacement for JBoss ON 3.0.1, and
includes several bug fixes and enhancements. Refer to the JBoss ON 3.1.0
Release Notes for information on the most significant of these changes. The
Release Notes will be available shortly from
https://docs.redhat.com/docs/en-US/index.html
The following security issue is also fixed with this release:
A flaw was found in the way the Apache Xerces2 Java Parser processed the
SYSTEM identifier in DTDs. A remote attacker could provide a
specially-crafted XML file, which once parsed by an application using the
Apache Xerces2 Java Parser, would lead to a denial of service (application
hang due to excessive CPU use). (CVE-2009-2625)
Warning: Before applying the update, back up your existing JBoss ON
installation (including its databases, applications, configuration files,
the JBoss ON server's file system directory, and so on).
All users of JBoss Operations Network 3.0.1 as provided from the Red Hat
Customer Portal are advised to upgrade to JBoss Operations Network 3.1.0.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "JBoss Operations Network 3.1.0, which fixes one security issue, several\nbugs, and adds enhancements, is now available from the Red Hat Customer\nPortal.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "JBoss Operations Network (JBoss ON) is a middleware management solution\nthat provides a single point of control to deploy, manage, and monitor\nJBoss Enterprise Middleware, applications, and services.\n\nThis JBoss ON 3.1.0 release serves as a replacement for JBoss ON 3.0.1, and\nincludes several bug fixes and enhancements. Refer to the JBoss ON 3.1.0\nRelease Notes for information on the most significant of these changes. The\nRelease Notes will be available shortly from\nhttps://docs.redhat.com/docs/en-US/index.html\n\nThe following security issue is also fixed with this release:\n\nA flaw was found in the way the Apache Xerces2 Java Parser processed the\nSYSTEM identifier in DTDs. A remote attacker could provide a\nspecially-crafted XML file, which once parsed by an application using the\nApache Xerces2 Java Parser, would lead to a denial of service (application\nhang due to excessive CPU use). (CVE-2009-2625)\n\nWarning: Before applying the update, back up your existing JBoss ON\ninstallation (including its databases, applications, configuration files,\nthe JBoss ON server\u0027s file system directory, and so on).\n\nAll users of JBoss Operations Network 3.0.1 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Operations Network 3.1.0.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2012:0725", "url": "https://access.redhat.com/errata/RHSA-2012:0725" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=em\u0026version=3.1.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions\u0026product=em\u0026version=3.1.0" }, { "category": "external", "summary": "https://docs.redhat.com/docs/en-US/index.html", "url": "https://docs.redhat.com/docs/en-US/index.html" }, { "category": "external", "summary": "512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2012/rhsa-2012_0725.json" } ], "title": "Red Hat Security Advisory: JBoss Operations Network 3.1.0 update", "tracking": { "current_release_date": "2024-11-14T10:50:26+00:00", "generator": { "date": "2024-11-14T10:50:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2012:0725", "initial_release_date": "2012-06-12T23:19:00+00:00", "revision_history": [ { "date": "2012-06-12T23:19:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2012-06-12T23:26:53+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:50:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Operations Network 3.1", "product": { "name": "Red Hat JBoss Operations Network 3.1", "product_id": "Red Hat JBoss Operations Network 3.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_operations_network:3.1" } } } ], "category": "product_family", "name": "Red Hat JBoss Middleware" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-2625", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512921" } ], "notes": [ { "category": "description", "text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: XML parsing Denial-Of-Service (6845701)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Operations Network 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2625" }, { "category": "external", "summary": "RHBZ#512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2012-06-12T23:19:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying this update, back up your\nexisting JBoss ON installation (including its databases, applications,\nconfiguration files, the JBoss ON server\u0027s file system directory, and so\non).\n\nRefer to the JBoss Operations Network 3.1.0 Release Notes for installation\ninformation.", "product_ids": [ "Red Hat JBoss Operations Network 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2012:0725" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Operations Network 3.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: XML parsing Denial-Of-Service (6845701)" } ] }
rhsa-2009_1637
Vulnerability from csaf_redhat
Published
2009-12-09 23:32
Modified
2024-12-15 18:16
Summary
Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0.CP08 update
Notes
Topic
Updated JBoss Enterprise Application Platform (JBEAP) 4.2 packages that fix
multiple security issues, several bugs, and add enhancements are now
available for Red Hat Enterprise Linux 4 as JBEAP 4.2.0.CP08.
This update has been rated as having moderate security impact by the Red
Hat Security Response Team.
Details
JBoss Enterprise Application Platform is the market leading platform for
innovative and scalable Java applications; integrating the JBoss
Application Server, with JBoss Hibernate and JBoss Seam into a complete,
simple enterprise solution.
This release of JBEAP for Red Hat Enterprise Linux 4 serves as a
replacement to JBEAP 4.2.0.CP07.
These updated packages include bug fixes and enhancements which are
detailed in the Release Notes, available shortly from:
http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/
The following security issues are also fixed with this release:
A missing check for the recommended minimum length of the truncated form of
HMAC-based XML signatures was found in xml-security. An attacker could use
this flaw to create a specially-crafted XML file that forges an XML
signature, allowing the attacker to bypass authentication that is based on
the XML Signature specification. (CVE-2009-0217)
Swatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss
Application Server Web Console. An attacker could use these flaws to
present misleading data to an authenticated user, or execute arbitrary
scripting code in the context of the authenticated user's browser session.
(CVE-2009-2405)
A flaw was found in the way the Apache Xerces2 Java Parser processed the
SYSTEM identifier in DTDs. A remote attacker could provide a
specially-crafted XML file, which once parsed by an application using the
Apache Xerces2 Java Parser, would lead to a denial of service (application
hang due to excessive CPU use). (CVE-2009-2625)
An information leak flaw was found in the twiddle command line client. The
JMX password was logged in plain text to "twiddle.log". (CVE-2009-3554)
An XSS flaw was found in the JMX Console. An attacker could use this flaw
to present misleading data to an authenticated user, or execute arbitrary
scripting code in the context of the authenticated user's browser session.
(CVE-2009-1380)
Warning: Before applying this update, please backup the JBEAP
"server/[configuration]/deploy/" directory, and any other customized
configuration files.
All users of JBEAP 4.2 on Red Hat Enterprise Linux 4 are advised to upgrade
to these updated packages.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated JBoss Enterprise Application Platform (JBEAP) 4.2 packages that fix\nmultiple security issues, several bugs, and add enhancements are now\navailable for Red Hat Enterprise Linux 4 as JBEAP 4.2.0.CP08.\n\nThis update has been rated as having moderate security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "JBoss Enterprise Application Platform is the market leading platform for\ninnovative and scalable Java applications; integrating the JBoss\nApplication Server, with JBoss Hibernate and JBoss Seam into a complete,\nsimple enterprise solution.\n\nThis release of JBEAP for Red Hat Enterprise Linux 4 serves as a\nreplacement to JBEAP 4.2.0.CP07.\n\nThese updated packages include bug fixes and enhancements which are\ndetailed in the Release Notes, available shortly from:\nhttp://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/\n\nThe following security issues are also fixed with this release:\n\nA missing check for the recommended minimum length of the truncated form of\nHMAC-based XML signatures was found in xml-security. An attacker could use\nthis flaw to create a specially-crafted XML file that forges an XML\nsignature, allowing the attacker to bypass authentication that is based on\nthe XML Signature specification. (CVE-2009-0217)\n\nSwatej Kumar discovered cross-site scripting (XSS) flaws in the JBoss\nApplication Server Web Console. An attacker could use these flaws to\npresent misleading data to an authenticated user, or execute arbitrary\nscripting code in the context of the authenticated user\u0027s browser session.\n(CVE-2009-2405)\n\nA flaw was found in the way the Apache Xerces2 Java Parser processed the\nSYSTEM identifier in DTDs. A remote attacker could provide a\nspecially-crafted XML file, which once parsed by an application using the\nApache Xerces2 Java Parser, would lead to a denial of service (application\nhang due to excessive CPU use). (CVE-2009-2625)\n\nAn information leak flaw was found in the twiddle command line client. The\nJMX password was logged in plain text to \"twiddle.log\". (CVE-2009-3554)\n\nAn XSS flaw was found in the JMX Console. An attacker could use this flaw\nto present misleading data to an authenticated user, or execute arbitrary\nscripting code in the context of the authenticated user\u0027s browser session.\n(CVE-2009-1380)\n\nWarning: Before applying this update, please backup the JBEAP\n\"server/[configuration]/deploy/\" directory, and any other customized\nconfiguration files.\n\nAll users of JBEAP 4.2 on Red Hat Enterprise Linux 4 are advised to upgrade\nto these updated packages.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1637", "url": "https://access.redhat.com/errata/RHSA-2009:1637" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/", "url": "http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/" }, { "category": "external", "summary": "510023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510023" }, { "category": "external", "summary": "511224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511224" }, { "category": "external", "summary": "511915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915" }, { "category": "external", "summary": "512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "532116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=532116" }, { "category": "external", "summary": "539495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539495" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1637.json" } ], "title": "Red Hat Security Advisory: JBoss Enterprise Application Platform 4.2.0.CP08 update", "tracking": { "current_release_date": "2024-12-15T18:16:23+00:00", "generator": { "date": "2024-12-15T18:16:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.3" } }, "id": "RHSA-2009:1637", "initial_release_date": "2009-12-09T23:32:00+00:00", "revision_history": [ { "date": "2009-12-09T23:32:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-12-09T18:32:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-12-15T18:16:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "product": { "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "product_id": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-remoting@2.2.3-3.SP1.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "product": { "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "product_id": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/quartz@1.5.2-1jpp.patch01.ep1.4.el4?arch=src" } } }, { "category": "product_version", "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "product": { "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "product_id": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-security@1.3.0-1.3.patch01.ep1.2.el4?arch=src" } } }, { "category": "product_version", "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "product": { "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "product_id": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-aop@1.5.5-3.CP04.2.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "product": { "name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "product_id": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2@2.7.1-9jpp.4.patch_02.1.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "product": { "name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "product_id": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jacorb@2.3.0-1jpp.ep1.9.el4?arch=src" } } }, { "category": "product_version", "name": "jgroups-1:2.4.7-1.ep1.el4.src", "product": { "name": "jgroups-1:2.4.7-1.ep1.el4.src", "product_id": "jgroups-1:2.4.7-1.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jgroups@2.4.7-1.ep1.el4?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "product": { "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "product_id": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP09.0jpp.ep1.1.el4?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "product": { "name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "product_id": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations@3.3.1-1.11.GA_CP02.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "product": { "name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "product_id": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.3.2-2.5.GA_CP01.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "product": { "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "product_id": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP12.0jpp.ep1.2.el4?arch=src" } } }, { "category": "product_version", "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "product": { "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "product_id": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.1.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "product": { "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "product_id": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common@1.2.1-0jpp.ep1.3.el4?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "product": { "name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "product_id": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-logging-jboss@1.1-9.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "jcommon-0:1.0.16-1.1.ep1.el4.src", "product": { "name": "jcommon-0:1.0.16-1.1.ep1.el4.src", "product_id": "jcommon-0:1.0.16-1.1.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jcommon@1.0.16-1.1.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "product": { "name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "product_id": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.1.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "product": { "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "product_id": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP08.1jpp.ep1.1.el4?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "product": { "name": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "product_id": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas@4.2.0-5.GA_CP08.5.ep1.el4?arch=src" } } }, { "category": "product_version", "name": "jboss-seam-0:1.2.1-1.ep1.22.el4.src", "product": { "name": "jboss-seam-0:1.2.1-1.ep1.22.el4.src", "product_id": "jboss-seam-0:1.2.1-1.ep1.22.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.22.el4?arch=src" } } }, { "category": "product_version", "name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "product": { "name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "product_id": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-6.GA_CP08.ep1.3.el4?arch=src" } } }, { "category": "product_version", "name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "product": { "name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "product_id": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-javamail@1.4.2-0jpp.ep1.5.el4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "product": { "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "product_id": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-remoting@2.2.3-3.SP1.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "product": { "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "product_id": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/quartz@1.5.2-1jpp.patch01.ep1.4.el4?arch=noarch" } } }, { "category": "product_version", "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "product": { "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "product_id": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xml-security@1.3.0-1.3.patch01.ep1.2.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "product": { "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "product_id": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-aop@1.5.5-3.CP04.2.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "product": { "name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "product_id": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2@2.7.1-9jpp.4.patch_02.1.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "product": { "name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "product_id": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jacorb@2.3.0-1jpp.ep1.9.el4?arch=noarch" } } }, { "category": "product_version", "name": "jgroups-1:2.4.7-1.ep1.el4.noarch", "product": { "name": "jgroups-1:2.4.7-1.ep1.el4.noarch", "product_id": "jgroups-1:2.4.7-1.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jgroups@2.4.7-1.ep1.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "product": { "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "product_id": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3@3.2.4-1.SP1_CP09.0jpp.ep1.1.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "product": { "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "product_id": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-javadoc@3.2.4-1.SP1_CP09.0jpp.ep1.1.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "product": { "name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "product_id": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations@3.3.1-1.11.GA_CP02.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "product": { "name": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "product_id": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-annotations-javadoc@3.3.1-1.11.GA_CP02.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "product": { "name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "product_id": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager@3.3.2-2.5.GA_CP01.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "product": { "name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "product_id": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate3-entitymanager-javadoc@3.3.2-2.5.GA_CP01.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "product": { "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "product_id": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.0.0-6.CP12.0jpp.ep1.2.el4?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "product": { "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "product_id": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-jsf@1.2_13-2.1.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "product": { "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "product_id": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-common@1.2.1-0jpp.ep1.3.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "product": { "name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "product_id": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-logging-jboss@1.1-9.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jcommon-0:1.0.16-1.1.ep1.el4.noarch", "product": { "name": "jcommon-0:1.0.16-1.1.ep1.el4.noarch", "product_id": "jcommon-0:1.0.16-1.1.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jcommon@1.0.16-1.1.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "product": { "name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "product_id": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jfreechart@1.0.13-2.3.1.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "product": { "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "product_id": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossts@4.2.3-1.SP5_CP08.1jpp.ep1.1.el4?arch=noarch\u0026epoch=1" } } }, { "category": "product_version", "name": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "product": { "name": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "product_id": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas@4.2.0-5.GA_CP08.5.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "product": { "name": "jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "product_id": "jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-client@4.2.0-5.GA_CP08.5.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "product": { "name": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "product_id": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-4.2.0.GA_CP08-bin@4.2.0-5.GA_CP08.5.ep1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "product": { "name": "jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "product_id": "jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam@1.2.1-1.ep1.22.el4?arch=noarch" } } }, { "category": "product_version", "name": "jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "product": { "name": "jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "product_id": "jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-seam-docs@1.2.1-1.ep1.22.el4?arch=noarch" } } }, { "category": "product_version", "name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "product": { "name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "product_id": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-eap-docs@4.2.0-6.GA_CP08.ep1.3.el4?arch=noarch" } } }, { "category": "product_version", "name": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "product": { "name": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "product_id": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-eap-docs-examples@4.2.0-6.GA_CP08.ep1.3.el4?arch=noarch" } } }, { "category": "product_version", "name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "product": { "name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "product_id": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glassfish-javamail@1.4.2-0jpp.ep1.5.el4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch" }, "product_reference": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src" }, "product_reference": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch" }, "product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src" }, "product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch" }, "product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src" }, "product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch" }, "product_reference": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src" }, "product_reference": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch" }, "product_reference": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch" }, "product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src" }, "product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch" }, "product_reference": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch" }, "product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch" }, "product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src" }, "product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch" }, "product_reference": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src" }, "product_reference": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch" }, "product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src" }, "product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch" }, "product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src" }, "product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch" }, "product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src" }, "product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-0:1.2.1-1.ep1.22.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch" }, "product_reference": "jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-0:1.2.1-1.ep1.22.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src" }, "product_reference": "jboss-seam-0:1.2.1-1.ep1.22.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch" }, "product_reference": "jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch" }, "product_reference": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src" }, "product_reference": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch" }, "product_reference": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch" }, "product_reference": "jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch" }, "product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src" }, "product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch" }, "product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src" }, "product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jcommon-0:1.0.16-1.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch" }, "product_reference": "jcommon-0:1.0.16-1.1.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jcommon-0:1.0.16-1.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src" }, "product_reference": "jcommon-0:1.0.16-1.1.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch" }, "product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src" }, "product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jgroups-1:2.4.7-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch" }, "product_reference": "jgroups-1:2.4.7-1.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jgroups-1:2.4.7-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src" }, "product_reference": "jgroups-1:2.4.7-1.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch" }, "product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src" }, "product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch" }, "product_reference": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src" }, "product_reference": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch" }, "product_reference": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch" }, "product_reference": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src" }, "product_reference": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch" }, "product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" }, "product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch" }, "product_reference": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src" }, "product_reference": "glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch" }, "product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src" }, "product_reference": "glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch" }, "product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src" }, "product_reference": "hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch" }, "product_reference": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src" }, "product_reference": "hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch" }, "product_reference": "hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch" }, "product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src" }, "product_reference": "hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch" }, "product_reference": "hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch" }, "product_reference": "hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch" }, "product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src" }, "product_reference": "jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch" }, "product_reference": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src" }, "product_reference": "jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch" }, "product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src" }, "product_reference": "jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch" }, "product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src" }, "product_reference": "jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch" }, "product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src" }, "product_reference": "jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-0:1.2.1-1.ep1.22.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch" }, "product_reference": "jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-0:1.2.1-1.ep1.22.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src" }, "product_reference": "jboss-seam-0:1.2.1-1.ep1.22.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch" }, "product_reference": "jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch" }, "product_reference": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src" }, "product_reference": "jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch" }, "product_reference": "jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch" }, "product_reference": "jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch" }, "product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src" }, "product_reference": "jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch" }, "product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src" }, "product_reference": "jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jcommon-0:1.0.16-1.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch" }, "product_reference": "jcommon-0:1.0.16-1.1.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jcommon-0:1.0.16-1.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src" }, "product_reference": "jcommon-0:1.0.16-1.1.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch" }, "product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src" }, "product_reference": "jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jgroups-1:2.4.7-1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch" }, "product_reference": "jgroups-1:2.4.7-1.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jgroups-1:2.4.7-1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src" }, "product_reference": "jgroups-1:2.4.7-1.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch" }, "product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src" }, "product_reference": "quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch" }, "product_reference": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src" }, "product_reference": "rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch" }, "product_reference": "rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch" }, "product_reference": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src" }, "product_reference": "xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch" }, "product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" }, "product_reference": "xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "relates_to_product_reference": "4ES-JBEAP" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0217", "discovery_date": "2009-07-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "511915" } ], "notes": [ { "category": "description", "text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0217" }, { "category": "external", "summary": "RHBZ#511915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0217" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217" } ], "release_date": "2009-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-09T23:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1637" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass" }, { "cve": "CVE-2009-1380", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2009-05-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "511224" } ], "notes": [ { "category": "description", "text": "Cross-site scripting (XSS) vulnerability in JMX-Console in JBossAs in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 allows remote attackers to inject arbitrary web script or HTML via the filter parameter, related to the key property and the position of quote and colon characters.", "title": "Vulnerability description" }, { "category": "summary", "text": "jbossas JMX-Console cross-site-scripting in filter parameter", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1380" }, { "category": "external", "summary": "RHBZ#511224", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511224" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1380", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1380" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1380", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1380" } ], "release_date": "2009-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-09T23:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1637" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jbossas JMX-Console cross-site-scripting in filter parameter" }, { "cve": "CVE-2009-2405", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2009-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "510023" } ], "notes": [ { "category": "description", "text": "Multiple cross-site scripting (XSS) vulnerabilities in the Web Console in the Application Server in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2.0 before 4.2.0.CP08, 4.2.2GA, 4.3 before 4.3.0.CP07, and 5.1.0GA allow remote attackers to inject arbitrary web script or HTML via the (1) monitorName, (2) objectName, (3) attribute, or (4) period parameter to createSnapshot.jsp, or the (5) monitorName, (6) objectName, (7) attribute, (8) threshold, (9) period, or (10) enabled parameter to createThresholdMonitor.jsp. NOTE: some of these details are obtained from third party information.", "title": "Vulnerability description" }, { "category": "summary", "text": "JBoss Application Server Web Console XSS", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw does not affect Red Hat JBoss Enterprise Application Platform 5 or 6. Older versions of the community JBoss Application Server 5.x may be affected.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2405" }, { "category": "external", "summary": "RHBZ#510023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=510023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2405", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2405" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2405", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2405" } ], "release_date": "2009-07-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-09T23:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1637" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JBoss Application Server Web Console XSS" }, { "cve": "CVE-2009-2625", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512921" } ], "notes": [ { "category": "description", "text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: XML parsing Denial-Of-Service (6845701)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2625" }, { "category": "external", "summary": "RHBZ#512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-09T23:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1637" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: XML parsing Denial-Of-Service (6845701)" }, { "cve": "CVE-2009-3554", "discovery_date": "2009-10-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "539495" } ], "notes": [ { "category": "description", "text": "Twiddle in Red Hat JBoss Enterprise Application Platform (aka JBoss EAP or JBEAP) 4.2 before 4.2.0.CP08 and 4.3 before 4.3.0.CP07 writes the JMX password, and other command-line arguments, to the twiddle.log file, which allows local users to obtain sensitive information by reading this file.", "title": "Vulnerability description" }, { "category": "summary", "text": "JBoss EAP Twiddle logs the JMX password", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3554" }, { "category": "external", "summary": "RHBZ#539495", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539495" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3554", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3554" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3554", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3554" } ], "release_date": "2009-10-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-12-09T23:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1637" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4AS-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4AS-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4AS-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4AS-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4AS-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4AS-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4AS-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4AS-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4AS-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4AS-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4AS-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4AS-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4AS-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4AS-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4AS-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4AS-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4AS-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4AS-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4AS-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.noarch", "4ES-JBEAP:glassfish-javamail-0:1.4.2-0jpp.ep1.5.el4.src", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.noarch", "4ES-JBEAP:glassfish-jsf-0:1.2_13-2.1.ep1.el4.src", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:hibernate3-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.src", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-annotations-0:3.3.1-1.11.GA_CP02.ep1.el4.src", "4ES-JBEAP:hibernate3-annotations-javadoc-0:3.3.1-1.11.GA_CP02.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-entitymanager-0:3.3.2-2.5.GA_CP01.ep1.el4.src", "4ES-JBEAP:hibernate3-entitymanager-javadoc-0:3.3.2-2.5.GA_CP01.ep1.el4.noarch", "4ES-JBEAP:hibernate3-javadoc-1:3.2.4-1.SP1_CP09.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.noarch", "4ES-JBEAP:jacorb-0:2.3.0-1jpp.ep1.9.el4.src", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.noarch", "4ES-JBEAP:jakarta-commons-logging-jboss-0:1.1-9.ep1.el4.src", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.noarch", "4ES-JBEAP:jboss-aop-0:1.5.5-3.CP04.2.ep1.el4.src", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.noarch", "4ES-JBEAP:jboss-common-0:1.2.1-0jpp.ep1.3.el4.src", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.noarch", "4ES-JBEAP:jboss-remoting-0:2.2.3-3.SP1.ep1.el4.src", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jboss-seam-0:1.2.1-1.ep1.22.el4.src", "4ES-JBEAP:jboss-seam-docs-0:1.2.1-1.ep1.22.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-0:4.2.0-5.GA_CP08.5.ep1.el4.src", "4ES-JBEAP:jbossas-4.2.0.GA_CP08-bin-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossas-client-0:4.2.0-5.GA_CP08.5.ep1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossts-1:4.2.3-1.SP5_CP08.1jpp.ep1.1.el4.src", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-6.CP12.0jpp.ep1.2.el4.src", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.noarch", "4ES-JBEAP:jcommon-0:1.0.16-1.1.ep1.el4.src", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.noarch", "4ES-JBEAP:jfreechart-0:1.0.13-2.3.1.ep1.el4.src", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.noarch", "4ES-JBEAP:jgroups-1:2.4.7-1.ep1.el4.src", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.noarch", "4ES-JBEAP:quartz-0:1.5.2-1jpp.patch01.ep1.4.el4.src", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:rh-eap-docs-0:4.2.0-6.GA_CP08.ep1.3.el4.src", "4ES-JBEAP:rh-eap-docs-examples-0:4.2.0-6.GA_CP08.ep1.3.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.noarch", "4ES-JBEAP:xerces-j2-0:2.7.1-9jpp.4.patch_02.1.ep1.el4.src", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.noarch", "4ES-JBEAP:xml-security-0:1.3.0-1.3.patch01.ep1.2.el4.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JBoss EAP Twiddle logs the JMX password" } ] }
rhsa-2013_0763
Vulnerability from csaf_redhat
Published
2013-04-22 21:17
Modified
2024-11-14 12:15
Summary
Red Hat Security Advisory: JBoss Web Framework Kit 2.2.0 update
Notes
Topic
JBoss Web Framework Kit 2.2.0, which fixes two security issues, various
bugs, and adds enhancements is now available from the Red Hat
Customer Portal.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
The JBoss Web Framework Kit combines popular open source web frameworks
into a single solution for Java applications.
This release of JBoss Web Framework Kit 2.2.0 serves as a replacement for
JBoss Web Framework Kit 2.1.0. It includes various bug fixes and
enhancements which are detailed in the JBoss Web Framework Kit 2.2.0
Release Notes. The Release Notes will be available shortly from
https://access.redhat.com/site/documentation/
This release also fixes the following security issues:
A flaw was found in the way the Apache Xerces2 Java Parser processed the
SYSTEM identifier in DTDs. A remote attacker could provide a
specially-crafted XML file, which once parsed by an application using the
Apache Xerces2 Java Parser, would lead to a denial of service (application
hang due to excessive CPU use). (CVE-2009-2625)
Note: Seam and RichFaces used the xerces:xercesImpl:2.9.1-patch01 artifact,
which is vulnerable to the CVE-2009-2625 flaw. In this release, the
artifact has been replaced with xerces:xercesImpl:2.9.1-redhat-3, which is
not vulnerable.
The Jakarta Commons HttpClient component did not verify that the server
hostname matched the domain name in the subject's Common Name (CN) or
subjectAltName field in X.509 certificates. This could allow a
man-in-the-middle attacker to spoof an SSL server if they had a certificate
that was valid for any domain name. (CVE-2012-5783)
Note: Jakarta Commons HttpClient 3 is vulnerable to CVE-2012-5783. Jakarta
Commons HttpClient 3 has reached its end of life as an Apache-maintained
component, and no upstream build is available that addresses this flaw. The
version of Jakarta Commons HttpClient 3 that ships with JBoss Web Framework
Kit 2.2.0 includes a patch for this flaw, which has been built by Red Hat.
Versions that are consumed from Maven Central do not have this patch
applied.
Jakarta Commons HttpClient 3 is a transitive dependency for multiple
components included in JBoss Web Framework Kit 2.2.0. If this dependency is
resolved using a build of HttpClient 3 from Maven Central, then this flaw
may be exposed.
Warning: Before applying this update, back up your existing installation of
JBoss Enterprise Application Platform or JBoss Enterprise Web Server, and
applications deployed to it.
All users of JBoss Web Framework Kit 2.1.0 as provided from the Red Hat
Customer Portal are advised to upgrade to JBoss Web Framework Kit 2.2.0.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "JBoss Web Framework Kit 2.2.0, which fixes two security issues, various\nbugs, and adds enhancements is now available from the Red Hat\nCustomer Portal.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The JBoss Web Framework Kit combines popular open source web frameworks\ninto a single solution for Java applications.\n\nThis release of JBoss Web Framework Kit 2.2.0 serves as a replacement for\nJBoss Web Framework Kit 2.1.0. It includes various bug fixes and\nenhancements which are detailed in the JBoss Web Framework Kit 2.2.0\nRelease Notes. The Release Notes will be available shortly from\nhttps://access.redhat.com/site/documentation/\n\nThis release also fixes the following security issues:\n\nA flaw was found in the way the Apache Xerces2 Java Parser processed the\nSYSTEM identifier in DTDs. A remote attacker could provide a\nspecially-crafted XML file, which once parsed by an application using the\nApache Xerces2 Java Parser, would lead to a denial of service (application\nhang due to excessive CPU use). (CVE-2009-2625)\n\nNote: Seam and RichFaces used the xerces:xercesImpl:2.9.1-patch01 artifact,\nwhich is vulnerable to the CVE-2009-2625 flaw. In this release, the\nartifact has been replaced with xerces:xercesImpl:2.9.1-redhat-3, which is\nnot vulnerable.\n\nThe Jakarta Commons HttpClient component did not verify that the server\nhostname matched the domain name in the subject\u0027s Common Name (CN) or\nsubjectAltName field in X.509 certificates. This could allow a\nman-in-the-middle attacker to spoof an SSL server if they had a certificate\nthat was valid for any domain name. (CVE-2012-5783)\n\nNote: Jakarta Commons HttpClient 3 is vulnerable to CVE-2012-5783. Jakarta\nCommons HttpClient 3 has reached its end of life as an Apache-maintained\ncomponent, and no upstream build is available that addresses this flaw. The\nversion of Jakarta Commons HttpClient 3 that ships with JBoss Web Framework\nKit 2.2.0 includes a patch for this flaw, which has been built by Red Hat.\nVersions that are consumed from Maven Central do not have this patch\napplied.\n\nJakarta Commons HttpClient 3 is a transitive dependency for multiple\ncomponents included in JBoss Web Framework Kit 2.2.0. If this dependency is\nresolved using a build of HttpClient 3 from Maven Central, then this flaw\nmay be exposed.\n\nWarning: Before applying this update, back up your existing installation of\nJBoss Enterprise Application Platform or JBoss Enterprise Web Server, and\napplications deployed to it.\n\nAll users of JBoss Web Framework Kit 2.1.0 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Web Framework Kit 2.2.0.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2013:0763", "url": "https://access.redhat.com/errata/RHSA-2013:0763" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=web.framework.kit\u0026downloadType=distributions", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=web.framework.kit\u0026downloadType=distributions" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/", "url": "https://access.redhat.com/site/documentation/" }, { "category": "external", "summary": "512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "873317", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=873317" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2013/rhsa-2013_0763.json" } ], "title": "Red Hat Security Advisory: JBoss Web Framework Kit 2.2.0 update", "tracking": { "current_release_date": "2024-11-14T12:15:06+00:00", "generator": { "date": "2024-11-14T12:15:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2013:0763", "initial_release_date": "2013-04-22T21:17:00+00:00", "revision_history": [ { "date": "2013-04-22T21:17:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2013-04-22T21:25:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T12:15:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Framework Kit 2.2", "product": { "name": "Red Hat JBoss Web Framework Kit 2.2", "product_id": "Red Hat JBoss Web Framework Kit 2.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_framework:2.2.0" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Framework Kit" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-2625", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512921" } ], "notes": [ { "category": "description", "text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: XML parsing Denial-Of-Service (6845701)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Framework Kit 2.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2625" }, { "category": "external", "summary": "RHBZ#512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-04-22T21:17:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying this update, back up your\nexisting installation of JBoss Enterprise Application Platform or JBoss\nEnterprise Web Server, and applications deployed to it.\n\nThe JBoss server process must be restarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Web Framework Kit 2.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0763" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Framework Kit 2.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: XML parsing Denial-Of-Service (6845701)" }, { "cve": "CVE-2012-5783", "discovery_date": "2012-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "873317" } ], "notes": [ { "category": "description", "text": "It was found that Apache Commons HttpClient 3.x, as used in Amazon Flexible Payments Service (FPS) merchant Java SDK and other products, does not verify that the server hostname matches a domain name in the subject\u0027s Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.", "title": "Vulnerability description" }, { "category": "summary", "text": "jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Framework Kit 2.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2012-5783" }, { "category": "external", "summary": "RHBZ#873317", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=873317" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2012-5783", "url": "https://www.cve.org/CVERecord?id=CVE-2012-5783" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2012-5783", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5783" } ], "release_date": "2012-10-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2013-04-22T21:17:00+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying this update, back up your\nexisting installation of JBoss Enterprise Application Platform or JBoss\nEnterprise Web Server, and applications deployed to it.\n\nThe JBoss server process must be restarted for this update to take effect.", "product_ids": [ "Red Hat JBoss Web Framework Kit 2.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2013:0763" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.0" }, "products": [ "Red Hat JBoss Web Framework Kit 2.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jakarta-commons-httpclient: missing connection hostname check against X.509 certificate name" } ] }
rhsa-2010_0043
Vulnerability from csaf_redhat
Published
2010-01-14 16:32
Modified
2024-11-14 10:47
Summary
Red Hat Security Advisory: Red Hat Network Satellite Server IBM Java Runtime security update
Notes
Topic
Updated java-1.6.0-ibm packages that fix several security issues are now
available for Red Hat Network Satellite Server 5.3.
This update has been rated as having low security impact by the Red Hat
Security Response Team.
Details
This update corrects several security vulnerabilities in the IBM Java
Runtime Environment shipped as part of Red Hat Network Satellite Server
5.3. In a typical operating environment, these are of low security risk as
the runtime is not used on untrusted applets.
Several flaws were fixed in the IBM Java 2 Runtime Environment.
(CVE-2009-0217, CVE-2009-1093, CVE-2009-1094, CVE-2009-1095, CVE-2009-1096,
CVE-2009-1097, CVE-2009-1098, CVE-2009-1099, CVE-2009-1100, CVE-2009-1101,
CVE-2009-1103, CVE-2009-1104, CVE-2009-1105, CVE-2009-1106, CVE-2009-1107,
CVE-2009-2625, CVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673,
CVE-2009-2674, CVE-2009-2675, CVE-2009-2676, CVE-2009-3865, CVE-2009-3866,
CVE-2009-3867, CVE-2009-3868, CVE-2009-3869, CVE-2009-3871, CVE-2009-3872,
CVE-2009-3873, CVE-2009-3874, CVE-2009-3875, CVE-2009-3876, CVE-2009-3877)
Users of Red Hat Network Satellite Server 5.3 are advised to upgrade to
these updated java-1.6.0-ibm packages, which resolve these issues. For this
update to take effect, Red Hat Network Satellite Server must be restarted
("/usr/sbin/rhn-satellite restart"), as well as all running instances of
IBM Java.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Network Satellite Server 5.3.\n\nThis update has been rated as having low security impact by the Red Hat\nSecurity Response Team.", "title": "Topic" }, { "category": "general", "text": "This update corrects several security vulnerabilities in the IBM Java\nRuntime Environment shipped as part of Red Hat Network Satellite Server\n5.3. In a typical operating environment, these are of low security risk as\nthe runtime is not used on untrusted applets.\n\nSeveral flaws were fixed in the IBM Java 2 Runtime Environment.\n(CVE-2009-0217, CVE-2009-1093, CVE-2009-1094, CVE-2009-1095, CVE-2009-1096,\nCVE-2009-1097, CVE-2009-1098, CVE-2009-1099, CVE-2009-1100, CVE-2009-1101,\nCVE-2009-1103, CVE-2009-1104, CVE-2009-1105, CVE-2009-1106, CVE-2009-1107,\nCVE-2009-2625, CVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673,\nCVE-2009-2674, CVE-2009-2675, CVE-2009-2676, CVE-2009-3865, CVE-2009-3866,\nCVE-2009-3867, CVE-2009-3868, CVE-2009-3869, CVE-2009-3871, CVE-2009-3872,\nCVE-2009-3873, CVE-2009-3874, CVE-2009-3875, CVE-2009-3876, CVE-2009-3877)\n\nUsers of Red Hat Network Satellite Server 5.3 are advised to upgrade to\nthese updated java-1.6.0-ibm packages, which resolve these issues. For this\nupdate to take effect, Red Hat Network Satellite Server must be restarted\n(\"/usr/sbin/rhn-satellite restart\"), as well as all running instances of\nIBM Java.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0043", "url": "https://access.redhat.com/errata/RHSA-2010:0043" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#low", "url": "http://www.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "490166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490166" }, { "category": "external", "summary": "490167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490167" }, { "category": "external", "summary": "490168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490168" }, { "category": "external", "summary": "490169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490169" }, { "category": "external", "summary": "490174", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490174" }, { "category": "external", "summary": "490178", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490178" }, { "category": "external", "summary": "492302", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492302" }, { "category": "external", "summary": "492305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492305" }, { "category": "external", "summary": "492306", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492306" }, { "category": "external", "summary": "492308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492308" }, { "category": "external", "summary": "492309", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492309" }, { "category": "external", "summary": "492310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492310" }, { "category": "external", "summary": "492312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492312" }, { "category": "external", "summary": "511915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915" }, { "category": "external", "summary": "512896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896" }, { "category": "external", "summary": "512907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907" }, { "category": "external", "summary": "512914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914" }, { "category": "external", "summary": "512915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915" }, { "category": "external", "summary": "512920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920" }, { "category": "external", "summary": "512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "515890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890" }, { "category": "external", "summary": "530053", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530053" }, { "category": "external", "summary": "530057", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530057" }, { "category": "external", "summary": "530061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061" }, { "category": "external", "summary": "530062", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530062" }, { "category": "external", "summary": "530063", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530063" }, { "category": "external", "summary": "530067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530067" }, { "category": "external", "summary": "532906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=532906" }, { "category": "external", "summary": "533211", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533211" }, { "category": "external", "summary": "533212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533212" }, { "category": "external", "summary": "533214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533214" }, { "category": "external", "summary": "533215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533215" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0043.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite Server IBM Java Runtime security update", "tracking": { "current_release_date": "2024-11-14T10:47:50+00:00", "generator": { "date": "2024-11-14T10:47:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2010:0043", "initial_release_date": "2010-01-14T16:32:00+00:00", "revision_history": [ { "date": "2010-01-14T16:32:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-01-14T11:32:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:47:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.3 (RHEL v.4)", "product": { "name": "Red Hat Satellite 5.3 (RHEL v.4)", "product_id": "4AS-RHNSAT5.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.3::el4" } } }, { "category": "product_name", "name": "Red Hat Satellite 5.3 (RHEL v.5)", "product": { "name": "Red Hat Satellite 5.3 (RHEL v.5)", "product_id": "5Server-Satellite53", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.3::el5" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "product": { "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.3.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "product": { "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "product": { "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.7-1jpp.2.el5?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "product": { "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.3.el4?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "product": { "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "product_id": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.7-1jpp.2.el5?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Satellite 5.3 (RHEL v.4)", "product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "relates_to_product_reference": "4AS-RHNSAT5.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Satellite 5.3 (RHEL v.4)", "product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "relates_to_product_reference": "4AS-RHNSAT5.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Satellite 5.3 (RHEL v.4)", "product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "relates_to_product_reference": "4AS-RHNSAT5.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src as a component of Red Hat Satellite 5.3 (RHEL v.4)", "product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "relates_to_product_reference": "4AS-RHNSAT5.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Satellite 5.3 (RHEL v.4)", "product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "relates_to_product_reference": "4AS-RHNSAT5.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386 as a component of Red Hat Satellite 5.3 (RHEL v.4)", "product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "relates_to_product_reference": "4AS-RHNSAT5.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390 as a component of Red Hat Satellite 5.3 (RHEL v.4)", "product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "relates_to_product_reference": "4AS-RHNSAT5.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x as a component of Red Hat Satellite 5.3 (RHEL v.4)", "product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "relates_to_product_reference": "4AS-RHNSAT5.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64 as a component of Red Hat Satellite 5.3 (RHEL v.4)", "product_id": "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "relates_to_product_reference": "4AS-RHNSAT5.3" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Satellite 5.3 (RHEL v.5)", "product_id": "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Satellite53" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Satellite 5.3 (RHEL v.5)", "product_id": "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "relates_to_product_reference": "5Server-Satellite53" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src as a component of Red Hat Satellite 5.3 (RHEL v.5)", "product_id": "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "relates_to_product_reference": "5Server-Satellite53" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Satellite 5.3 (RHEL v.5)", "product_id": "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Satellite53" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386 as a component of Red Hat Satellite 5.3 (RHEL v.5)", "product_id": "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Satellite53" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x as a component of Red Hat Satellite 5.3 (RHEL v.5)", "product_id": "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "relates_to_product_reference": "5Server-Satellite53" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64 as a component of Red Hat Satellite 5.3 (RHEL v.5)", "product_id": "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Satellite53" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0217", "discovery_date": "2009-07-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "511915" } ], "notes": [ { "category": "description", "text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0217" }, { "category": "external", "summary": "RHBZ#511915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0217" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217" } ], "release_date": "2009-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass" }, { "cve": "CVE-2009-1093", "discovery_date": "2009-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "490167" } ], "notes": [ { "category": "description", "text": "LdapCtx in the LDAP service in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier does not close the connection when initialization fails, which allows remote attackers to cause a denial of service (LDAP service hang).", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK remote LDAP Denial-Of-Service (6717680)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1093" }, { "category": "external", "summary": "RHBZ#490167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1093", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1093" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1093", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1093" } ], "release_date": "2009-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK remote LDAP Denial-Of-Service (6717680)" }, { "cve": "CVE-2009-1094", "discovery_date": "2009-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "490168" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the LDAP implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; SDK and JRE 1.3.1_24 and earlier; and 1.4.2_19 and earlier allows remote LDAP servers to execute arbitrary code via unknown vectors related to serialized data.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK LDAP client remote code execution (6737315)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1094" }, { "category": "external", "summary": "RHBZ#490168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490168" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1094", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1094" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1094", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1094" } ], "release_date": "2009-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK LDAP client remote code execution (6737315)" }, { "cve": "CVE-2009-1095", "discovery_date": "2009-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "490169" } ], "notes": [ { "category": "description", "text": "Integer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1095" }, { "category": "external", "summary": "RHBZ#490169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1095", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1095" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1095", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1095" } ], "release_date": "2009-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)" }, { "cve": "CVE-2009-1096", "discovery_date": "2009-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "490169" } ], "notes": [ { "category": "description", "text": "Buffer overflow in unpack200 in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via a JAR file with crafted Pack200 headers.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1096" }, { "category": "external", "summary": "RHBZ#490169", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490169" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1096", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1096" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1096", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1096" } ], "release_date": "2009-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK Pack200 Buffer overflow vulnerability (6792554)" }, { "cve": "CVE-2009-1097", "discovery_date": "2009-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "490174" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allow remote attackers to access files or execute arbitrary code via (1) a crafted PNG image that triggers an integer overflow during memory allocation for display on the splash screen, aka CR 6804996; and (2) a crafted GIF image from which unspecified values are used in calculation of offsets, leading to object-pointer corruption, aka CR 6804997.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: PNG and GIF processing buffer overflow vulnerabilities (6804996, 6804997)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1097" }, { "category": "external", "summary": "RHBZ#490174", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490174" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1097", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1097" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1097", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1097" } ], "release_date": "2009-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: PNG and GIF processing buffer overflow vulnerabilities (6804996, 6804997)" }, { "cve": "CVE-2009-1098", "discovery_date": "2009-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "490178" } ], "notes": [ { "category": "description", "text": "Buffer overflow in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files or execute arbitrary code via a crafted GIF image, aka CR 6804998.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK GIF processing buffer overflow vulnerability (6804998)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1098" }, { "category": "external", "summary": "RHBZ#490178", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490178" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1098", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1098" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1098", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1098" } ], "release_date": "2009-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK GIF processing buffer overflow vulnerability (6804998)" }, { "cve": "CVE-2009-1099", "discovery_date": "2009-03-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "492302" } ], "notes": [ { "category": "description", "text": "Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via crafted glyph descriptions in a Type1 font, which bypasses a signed comparison and triggers a buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Type1 font processing buffer overflow vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1099" }, { "category": "external", "summary": "RHBZ#492302", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492302" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1099", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1099" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1099", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1099" } ], "release_date": "2009-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Type1 font processing buffer overflow vulnerability" }, { "cve": "CVE-2009-1100", "discovery_date": "2009-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "492305" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allow remote attackers to cause a denial of service (disk consumption) via vectors related to temporary font files and (1) \"limits on Font creation,\" aka CR 6522586, and (2) another unspecified vector, aka CR 6632886.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: DoS (disk consumption) via handling of temporary font files", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1100" }, { "category": "external", "summary": "RHBZ#492305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492305" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1100", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1100" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1100", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1100" } ], "release_date": "2009-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK: DoS (disk consumption) via handling of temporary font files" }, { "cve": "CVE-2009-1101", "discovery_date": "2009-03-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "490166" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the lightweight HTTP server implementation in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier allows remote attackers to cause a denial of service (probably resource consumption) for a JAX-WS service endpoint via a connection without any data, which triggers a file descriptor \"leak.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK JAX-WS service endpoint remote Denial-of-Service (6630639)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1101" }, { "category": "external", "summary": "RHBZ#490166", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=490166" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1101", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1101" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1101", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1101" } ], "release_date": "2009-03-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK JAX-WS service endpoint remote Denial-of-Service (6630639)" }, { "cve": "CVE-2009-1103", "discovery_date": "2009-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "492306" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; 1.4.2_19 and earlier; and 1.3.1_24 and earlier allows remote attackers to access files and execute arbitrary code via unknown vectors related to \"deserializing applets,\" aka CR 6646860.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Files disclosure, arbitrary code execution via \"deserializing applets\" (6646860)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1103" }, { "category": "external", "summary": "RHBZ#492306", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492306" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1103", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1103" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1103", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1103" } ], "release_date": "2009-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Files disclosure, arbitrary code execution via \"deserializing applets\" (6646860)" }, { "cve": "CVE-2009-1104", "discovery_date": "2009-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "492308" } ], "notes": [ { "category": "description", "text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier; 6 Update 12 and earlier; and 1.4.2_19 and earlier does not prevent Javascript that is loaded from the localhost from connecting to other ports on the system, which allows user-assisted attackers to bypass intended access restrictions via LiveConnect, aka CR 6724331. NOTE: this vulnerability can be leveraged with separate cross-site scripting (XSS) vulnerabilities for remote attack vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Intended access restrictions bypass via LiveConnect (6724331)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1104" }, { "category": "external", "summary": "RHBZ#492308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492308" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1104", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1104" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1104", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1104" } ], "release_date": "2009-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Intended access restrictions bypass via LiveConnect (6724331)" }, { "cve": "CVE-2009-1105", "discovery_date": "2009-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "492309" } ], "notes": [ { "category": "description", "text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12, 11, and 10 allows user-assisted remote attackers to cause a trusted applet to run in an older JRE version, which can be used to exploit vulnerabilities in that older version, aka CR 6706490.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Possibility of trusted applet run in older, vulnerable version of JRE (6706490)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1105" }, { "category": "external", "summary": "RHBZ#492309", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492309" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1105", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1105" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1105", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1105" } ], "release_date": "2009-03-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: Possibility of trusted applet run in older, vulnerable version of JRE (6706490)" }, { "cve": "CVE-2009-1106", "discovery_date": "2009-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "492310" } ], "notes": [ { "category": "description", "text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12, 11, and 10 does not properly parse crossdomain.xml files, which allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unknown vectors, aka CR 6798948.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Improper parsing of crossdomain.xml files (intended access restriction bypass) (6798948)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1106" }, { "category": "external", "summary": "RHBZ#492310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1106", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1106" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1106", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1106" } ], "release_date": "2009-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Improper parsing of crossdomain.xml files (intended access restriction bypass) (6798948)" }, { "cve": "CVE-2009-1107", "discovery_date": "2009-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "492312" } ], "notes": [ { "category": "description", "text": "The Java Plug-in in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 6 Update 12 and earlier, and 5.0 Update 17 and earlier, allows remote attackers to trick a user into trusting a signed applet via unknown vectors that misrepresent the security warning dialog, related to a \"Swing JLabel HTML parsing vulnerability,\" aka CR 6782871.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: Signed applet remote misuse possibility (6782871)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-1107" }, { "category": "external", "summary": "RHBZ#492312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=492312" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-1107", "url": "https://www.cve.org/CVERecord?id=CVE-2009-1107" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-1107", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-1107" } ], "release_date": "2009-03-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK: Signed applet remote misuse possibility (6782871)" }, { "cve": "CVE-2009-2625", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512921" } ], "notes": [ { "category": "description", "text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: XML parsing Denial-Of-Service (6845701)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2625" }, { "category": "external", "summary": "RHBZ#512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: XML parsing Denial-Of-Service (6845701)" }, { "cve": "CVE-2009-2670", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512896" } ], "notes": [ { "category": "description", "text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Untrusted applet System properties access (6738524)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2670" }, { "category": "external", "summary": "RHBZ#512896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2670" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK Untrusted applet System properties access (6738524)" }, { "cve": "CVE-2009-2671", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512907" } ], "notes": [ { "category": "description", "text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Proxy mechanism information leaks (6801071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2671" }, { "category": "external", "summary": "RHBZ#512907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2671" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Proxy mechanism information leaks (6801071)" }, { "cve": "CVE-2009-2672", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512907" } ], "notes": [ { "category": "description", "text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Proxy mechanism information leaks (6801071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2672" }, { "category": "external", "summary": "RHBZ#512907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Proxy mechanism information leaks (6801071)" }, { "cve": "CVE-2009-2673", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512914" } ], "notes": [ { "category": "description", "text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2673" }, { "category": "external", "summary": "RHBZ#512914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2673" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)" }, { "cve": "CVE-2009-2674", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512915" } ], "notes": [ { "category": "description", "text": "Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start Buffer JPEG processing integer overflow (6823373)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2674" }, { "category": "external", "summary": "RHBZ#512915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2674", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2674" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java Web Start Buffer JPEG processing integer overflow (6823373)" }, { "cve": "CVE-2009-2675", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512920" } ], "notes": [ { "category": "description", "text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2675" }, { "category": "external", "summary": "RHBZ#512920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)" }, { "cve": "CVE-2009-2676", "discovery_date": "2009-08-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "515890" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.", "title": "Vulnerability description" }, { "category": "summary", "text": "JRE applet launcher vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2676" }, { "category": "external", "summary": "RHBZ#515890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2676", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2676" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JRE applet launcher vulnerability" }, { "cve": "CVE-2009-3865", "discovery_date": "2009-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "533211" } ], "notes": [ { "category": "description", "text": "The launch method in the Deployment Toolkit plugin in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 6 before Update 17 allows remote attackers to execute arbitrary commands via a crafted web page, aka Bug Id 6869752.", "title": "Vulnerability description" }, { "category": "summary", "text": "java-1.6.0-sun: ACE in JRE Deployment Toolkit (6869752)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3865" }, { "category": "external", "summary": "RHBZ#533211", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533211" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3865", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3865" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3865", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3865" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "java-1.6.0-sun: ACE in JRE Deployment Toolkit (6869752)" }, { "cve": "CVE-2009-3866", "discovery_date": "2009-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "533212" } ], "notes": [ { "category": "description", "text": "The Java Web Start Installer in Sun Java SE in JDK and JRE 6 before Update 17 does not properly use security model permissions when removing installer extensions, which allows remote attackers to execute arbitrary code by modifying a certain JNLP file to have a URL field that points to an unintended trusted application, aka Bug Id 6872824.", "title": "Vulnerability description" }, { "category": "summary", "text": "java-1.6.0-sun: Privilege escalation in the Java Web Start Installer (6872824)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3866" }, { "category": "external", "summary": "RHBZ#533212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3866", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3866" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3866", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3866" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "java-1.6.0-sun: Privilege escalation in the Java Web Start Installer (6872824)" }, { "cve": "CVE-2009-3867", "cwe": { "id": "CWE-121", "name": "Stack-based Buffer Overflow" }, "discovery_date": "2009-11-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "533214" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in the HsbParser.getSoundBank function in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a long file: URL in an argument, aka Bug Id 6854303.", "title": "Vulnerability description" }, { "category": "summary", "text": "java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3867" }, { "category": "external", "summary": "RHBZ#533214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3867", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3867" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3867", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3867" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "java-1.6.0-sun: Stack-based buffer overflow via a long file: URL argument (6854303)" }, { "cve": "CVE-2009-3868", "discovery_date": "2009-11-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "533215" } ], "notes": [ { "category": "description", "text": "Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 does not properly parse color profiles, which allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862970.", "title": "Vulnerability description" }, { "category": "summary", "text": "java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3868" }, { "category": "external", "summary": "RHBZ#533215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533215" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3868", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3868" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3868", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3868" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "java-1.6.0-sun: Privilege escalation via crafted image file due improper color profiles parsing (6862970)" }, { "cve": "CVE-2009-3869", "discovery_date": "2009-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530062" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in the setDiffICM function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via a crafted argument, aka Bug Id 6872357.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK JRE AWT setDifflCM stack overflow (6872357)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3869" }, { "category": "external", "summary": "RHBZ#530062", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530062" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3869", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3869" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3869", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3869" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK JRE AWT setDifflCM stack overflow (6872357)" }, { "cve": "CVE-2009-3871", "discovery_date": "2009-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530063" } ], "notes": [ { "category": "description", "text": "Heap-based buffer overflow in the setBytePixels function in the Abstract Window Toolkit (AWT) in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via crafted arguments, aka Bug Id 6872358.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK JRE AWT setBytePixels heap overflow (6872358)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3871" }, { "category": "external", "summary": "RHBZ#530063", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530063" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3871", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3871" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3871", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3871" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK JRE AWT setBytePixels heap overflow (6872358)" }, { "cve": "CVE-2009-3872", "discovery_date": "2009-11-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "532906" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the JPEG JFIF Decoder in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, aka Bug Id 6862969.", "title": "Vulnerability description" }, { "category": "summary", "text": "JRE JPEG JFIF Decoder issue (6862969)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3872" }, { "category": "external", "summary": "RHBZ#532906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=532906" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3872", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3872" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3872", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3872" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JRE JPEG JFIF Decoder issue (6862969)" }, { "cve": "CVE-2009-3873", "discovery_date": "2009-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530053" } ], "notes": [ { "category": "description", "text": "The JPEG Image Writer in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to gain privileges via a crafted image file, related to a \"quantization problem,\" aka Bug Id 6862968.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK JPEG Image Writer quantization problem (6862968)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3873" }, { "category": "external", "summary": "RHBZ#530053", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530053" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3873", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3873" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3873", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3873" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK JPEG Image Writer quantization problem (6862968)" }, { "cve": "CVE-2009-3874", "discovery_date": "2009-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530067" } ], "notes": [ { "category": "description", "text": "Integer overflow in the JPEGImageReader implementation in the ImageI/O component in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to execute arbitrary code via large subsample dimensions in a JPEG file that triggers a heap-based buffer overflow, aka Bug Id 6874643.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK ImageI/O JPEG heap overflow (6874643)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3874" }, { "category": "external", "summary": "RHBZ#530067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530067" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3874", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3874" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3874", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3874" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK ImageI/O JPEG heap overflow (6874643)" }, { "cve": "CVE-2009-3875", "discovery_date": "2009-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530057" } ], "notes": [ { "category": "description", "text": "The MessageDigest.isEqual function in Java Runtime Environment (JRE) in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to spoof HMAC-based digital signatures, and possibly bypass authentication, via unspecified vectors related to \"timing attack vulnerabilities,\" aka Bug Id 6863503.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3875" }, { "category": "external", "summary": "RHBZ#530057", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530057" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3875", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3875" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3875", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3875" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK MessageDigest.isEqual introduces timing attack vulnerabilities (6863503)" }, { "cve": "CVE-2009-3876", "discovery_date": "2009-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530061" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted DER encoded data, which is not properly decoded by the ASN.1 DER input stream parser, aka Bug Id 6864911.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3876" }, { "category": "external", "summary": "RHBZ#530061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3876", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3876" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3876", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3876" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877" }, { "cve": "CVE-2009-3877", "discovery_date": "2009-10-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "530061" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in Sun Java SE in JDK and JRE 5.0 before Update 22, JDK and JRE 6 before Update 17, SDK and JRE 1.3.x before 1.3.1_27, and SDK and JRE 1.4.x before 1.4.2_24 allows remote attackers to cause a denial of service (memory consumption) via crafted HTTP headers, which are not properly parsed by the ASN.1 DER input stream parser, aka Bug Id 6864911.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3877" }, { "category": "external", "summary": "RHBZ#530061", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=530061" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3877", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3877" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3877", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3877" } ], "release_date": "2009-11-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-01-14T16:32:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0043" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.src", "4AS-RHNSAT5.3:java-1.6.0-ibm-1:1.6.0.7-1jpp.3.el4.x86_64", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.i386", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.s390x", "4AS-RHNSAT5.3:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.3.el4.x86_64", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.src", "5Server-Satellite53:java-1.6.0-ibm-1:1.6.0.7-1jpp.2.el5.x86_64", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.i386", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.s390x", "5Server-Satellite53:java-1.6.0-ibm-devel-1:1.6.0.7-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK ASN.1/DER input stream parser denial of service (6864911) CVE-2009-3877" } ] }
rhsa-2009_1199
Vulnerability from csaf_redhat
Published
2009-08-06 20:38
Modified
2024-11-14 10:46
Summary
Red Hat Security Advisory: java-1.5.0-sun security update
Notes
Topic
Updated java-1.5.0-sun packages that correct several security issues are
now available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
Details
The Sun 1.5.0 Java release includes the Sun Java 5 Runtime Environment and
the Sun Java 5 Software Development Kit.
This update fixes several vulnerabilities in the Sun Java 5 Runtime
Environment and the Sun Java 5 Software Development Kit. These
vulnerabilities are summarized on the "Advance notification of Security
Updates for Java SE" page from Sun Microsystems, listed in the References
section. (CVE-2009-2475, CVE-2009-2625, CVE-2009-2670, CVE-2009-2671,
CVE-2009-2672, CVE-2009-2673, CVE-2009-2675, CVE-2009-2676, CVE-2009-2689)
Users of java-1.5.0-sun should upgrade to these updated packages, which
correct these issues. All running instances of Sun Java must be restarted
for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.5.0-sun packages that correct several security issues are\nnow available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Sun 1.5.0 Java release includes the Sun Java 5 Runtime Environment and\nthe Sun Java 5 Software Development Kit.\n\nThis update fixes several vulnerabilities in the Sun Java 5 Runtime\nEnvironment and the Sun Java 5 Software Development Kit. These\nvulnerabilities are summarized on the \"Advance notification of Security\nUpdates for Java SE\" page from Sun Microsystems, listed in the References\nsection. (CVE-2009-2475, CVE-2009-2625, CVE-2009-2670, CVE-2009-2671,\nCVE-2009-2672, CVE-2009-2673, CVE-2009-2675, CVE-2009-2676, CVE-2009-2689)\n\nUsers of java-1.5.0-sun should upgrade to these updated packages, which\ncorrect these issues. All running instances of Sun Java must be restarted\nfor the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1199", "url": "https://access.redhat.com/errata/RHSA-2009:1199" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5", "url": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5" }, { "category": "external", "summary": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-118667-22-1" }, { "category": "external", "summary": "512896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896" }, { "category": "external", "summary": "512907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907" }, { "category": "external", "summary": "512914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914" }, { "category": "external", "summary": "512920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920" }, { "category": "external", "summary": "512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "513215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215" }, { "category": "external", "summary": "513222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222" }, { "category": "external", "summary": "515890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1199.json" } ], "title": "Red Hat Security Advisory: java-1.5.0-sun security update", "tracking": { "current_release_date": "2024-11-14T10:46:47+00:00", "generator": { "date": "2024-11-14T10:46:47+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2009:1199", "initial_release_date": "2009-08-06T20:38:00+00:00", "revision_history": [ { "date": "2009-08-06T20:38:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-08-06T16:38:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:46:47+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "product": { "name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "product_id": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.20-1jpp.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "product": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "product_id": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-jdbc@1.5.0.20-1jpp.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "product": { "name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "product_id": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-demo@1.5.0.20-1jpp.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "product": { "name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "product_id": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-src@1.5.0.20-1jpp.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "product": { "name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "product_id": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.20-1jpp.1.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "product": { "name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "product_id": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.20-1jpp.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "product": { "name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "product_id": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.20-1jpp.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "product": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "product_id": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-jdbc@1.5.0.20-1jpp.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "product": { "name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "product_id": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-demo@1.5.0.20-1jpp.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "product": { "name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "product_id": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-src@1.5.0.20-1jpp.1.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "product": { "name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "product_id": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.20-1jpp.1.el4?arch=i586" } } }, { "category": "product_version", "name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "product": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "product_id": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-jdbc@1.5.0.20-1jpp.1.el4?arch=i586" } } }, { "category": "product_version", "name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "product": { "name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "product_id": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-demo@1.5.0.20-1jpp.1.el4?arch=i586" } } }, { "category": "product_version", "name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "product": { "name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "product_id": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-plugin@1.5.0.20-1jpp.1.el4?arch=i586" } } }, { "category": "product_version", "name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "product": { "name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "product_id": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-src@1.5.0.20-1jpp.1.el4?arch=i586" } } }, { "category": "product_version", "name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "product": { "name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "product_id": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.20-1jpp.1.el4?arch=i586" } } }, { "category": "product_version", "name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "product": { "name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "product_id": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-plugin@1.5.0.20-1jpp.1.el5?arch=i586" } } }, { "category": "product_version", "name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "product": { "name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "product_id": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-devel@1.5.0.20-1jpp.1.el5?arch=i586" } } }, { "category": "product_version", "name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "product": { "name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "product_id": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun@1.5.0.20-1jpp.1.el5?arch=i586" } } }, { "category": "product_version", "name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "product": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "product_id": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-jdbc@1.5.0.20-1jpp.1.el5?arch=i586" } } }, { "category": "product_version", "name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "product": { "name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "product_id": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-demo@1.5.0.20-1jpp.1.el5?arch=i586" } } }, { "category": "product_version", "name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "product": { "name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "product_id": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-sun-src@1.5.0.20-1jpp.1.el5?arch=i586" } } } ], "category": "architecture", "name": "i586" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586" }, "product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64" }, "product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586" }, "product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586" }, "product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586" }, "product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586" }, "product_reference": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586" }, "product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586" }, "product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586" }, "product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586" }, "product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586" }, "product_reference": "java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586" }, "product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" }, "product_reference": "java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-2475", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "513215" } ], "notes": [ { "category": "description", "text": "Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2475" }, { "category": "external", "summary": "RHBZ#513215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2475", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:38:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1199" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)" }, { "cve": "CVE-2009-2625", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512921" } ], "notes": [ { "category": "description", "text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: XML parsing Denial-Of-Service (6845701)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2625" }, { "category": "external", "summary": "RHBZ#512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:38:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1199" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: XML parsing Denial-Of-Service (6845701)" }, { "cve": "CVE-2009-2670", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512896" } ], "notes": [ { "category": "description", "text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Untrusted applet System properties access (6738524)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2670" }, { "category": "external", "summary": "RHBZ#512896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2670" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:38:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1199" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK Untrusted applet System properties access (6738524)" }, { "cve": "CVE-2009-2671", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512907" } ], "notes": [ { "category": "description", "text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Proxy mechanism information leaks (6801071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2671" }, { "category": "external", "summary": "RHBZ#512907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2671" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:38:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1199" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Proxy mechanism information leaks (6801071)" }, { "cve": "CVE-2009-2672", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512907" } ], "notes": [ { "category": "description", "text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Proxy mechanism information leaks (6801071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2672" }, { "category": "external", "summary": "RHBZ#512907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:38:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1199" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Proxy mechanism information leaks (6801071)" }, { "cve": "CVE-2009-2673", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512914" } ], "notes": [ { "category": "description", "text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2673" }, { "category": "external", "summary": "RHBZ#512914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2673" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:38:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1199" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)" }, { "cve": "CVE-2009-2675", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512920" } ], "notes": [ { "category": "description", "text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2675" }, { "category": "external", "summary": "RHBZ#512920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:38:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1199" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)" }, { "cve": "CVE-2009-2676", "discovery_date": "2009-08-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "515890" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.", "title": "Vulnerability description" }, { "category": "summary", "text": "JRE applet launcher vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2676" }, { "category": "external", "summary": "RHBZ#515890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2676", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2676" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:38:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1199" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JRE applet launcher vulnerability" }, { "cve": "CVE-2009-2689", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "513222" } ], "notes": [ { "category": "description", "text": "JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK JDK13Services grants unnecessary privileges (6777448)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2689" }, { "category": "external", "summary": "RHBZ#513222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2689", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2689" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2689", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2689" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:38:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1199" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK JDK13Services grants unnecessary privileges (6777448)" }, { "cve": "CVE-2009-2720", "discovery_date": "2009-08-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "516823" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the javax.swing.plaf.synth.SynthContext.isSubregion method in the Swing implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException in the Jemmy library) via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK DoS with Swing Synthcontext implementation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2720" }, { "category": "external", "summary": "RHBZ#516823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516823" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2720", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2720" } ], "release_date": "2009-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:38:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1199" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JDK DoS with Swing Synthcontext implementation" }, { "cve": "CVE-2009-2721", "discovery_date": "2009-08-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "516826" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the Provider class in Sun Java SE 5.0 before Update 20 have unknown impact and attack vectors, aka BugId 6406003.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Multiple unspecified vulnerabilities in Provider class", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2721" }, { "category": "external", "summary": "RHBZ#516826", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516826" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2721", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2721" } ], "release_date": "2009-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:38:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1199" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JDK Multiple unspecified vulnerabilities in Provider class" }, { "cve": "CVE-2009-2722", "discovery_date": "2009-08-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "516829" } ], "notes": [ { "category": "description", "text": "Multiple unspecified vulnerabilities in the Provider class in Sun Java SE 5.0 before Update 20 have unknown impact and attack vectors, aka BugId 6429594. NOTE: this issue exists because of an incorrect fix for BugId 6406003.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Multiple unspecified vulnerabilities in Provider class (incorrect fix)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2722" }, { "category": "external", "summary": "RHBZ#516829", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516829" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2722", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2722" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2722", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2722" } ], "release_date": "2009-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:38:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1199" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JDK Multiple unspecified vulnerabilities in Provider class (incorrect fix)" }, { "cve": "CVE-2009-2723", "discovery_date": "2009-08-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "516832" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in deserialization in the Provider class in Sun Java SE 5.0 before Update 20 has unknown impact and attack vectors, aka BugId 6444262.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified deserialization in Provider class", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2723" }, { "category": "external", "summary": "RHBZ#516832", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516832" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2723", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2723" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2723", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2723" } ], "release_date": "2009-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:38:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1199" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JDK unspecified deserialization in Provider class" }, { "cve": "CVE-2009-2724", "discovery_date": "2009-08-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "516834" } ], "notes": [ { "category": "description", "text": "Race condition in the java.lang package in Sun Java SE 5.0 before Update 20 has unknown impact and attack vectors, related to a \"3Y Race condition in reflection checks.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK race condition vulnerability reflection checks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2724" }, { "category": "external", "summary": "RHBZ#516834", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516834" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2724", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2724" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2724", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2724" } ], "release_date": "2009-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:38:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1199" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4AS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4AS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4Desktop-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4ES-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4ES-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el4.x86_64", "4WS-LACD:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.i586", "4WS-LACD:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Client-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-demo-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-devel-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-jdbc-0:1.5.0.20-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.5.0-sun-plugin-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.i586", "5Server-Supplementary:java-1.5.0-sun-src-0:1.5.0.20-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK race condition vulnerability reflection checks" } ] }
rhsa-2009_1201
Vulnerability from csaf_redhat
Published
2009-08-06 21:14
Modified
2024-11-14 10:47
Summary
Red Hat Security Advisory: java-1.6.0-openjdk security and bug fix update
Notes
Topic
Updated java-1.6.0-openjdk packages that fix several security issues and a
bug are now available for Red Hat Enterprise Linux 5.
This update has been rated as having important security impact by the Red
Hat Security Response Team.
Details
These packages provide the OpenJDK 6 Java Runtime Environment and the
OpenJDK 6 Software Development Kit. The Java Runtime Environment (JRE)
contains the software and tools that users need to run applications written
using the Java programming language.
A flaw was found in the way the XML Digital Signature implementation in the
JRE handled HMAC-based XML signatures. An attacker could use this flaw to
create a crafted signature that could allow them to bypass authentication,
or trick a user, applet, or application into accepting untrusted content.
(CVE-2009-0217)
Several potential information leaks were found in various mutable static
variables. These could be exploited in application scenarios that execute
untrusted scripting code. (CVE-2009-2475)
It was discovered that OpenType checks can be bypassed. This could allow a
rogue application to bypass access restrictions by acquiring references to
privileged objects through finalizer resurrection. (CVE-2009-2476)
A denial of service flaw was found in the way the JRE processes XML. A
remote attacker could use this flaw to supply crafted XML that would lead
to a denial of service. (CVE-2009-2625)
A flaw was found in the JRE audio system. An untrusted applet or
application could use this flaw to gain read access to restricted System
properties. (CVE-2009-2670)
Two flaws were found in the JRE proxy implementation. An untrusted applet
or application could use these flaws to discover the usernames of users
running applets and applications, or obtain web browser cookies and use
them for session hijacking attacks. (CVE-2009-2671, CVE-2009-2672)
An additional flaw was found in the proxy mechanism implementation. This
flaw allowed an untrusted applet or application to bypass access
restrictions and communicate using non-authorized socket or URL connections
to hosts other than the origin host. (CVE-2009-2673)
An integer overflow flaw was found in the way the JRE processes JPEG
images. An untrusted application could use this flaw to extend its
privileges, allowing it to read and write local files, as well as to
execute local applications with the privileges of the user running the
application. (CVE-2009-2674)
An integer overflow flaw was found in the JRE unpack200 functionality. An
untrusted applet or application could extend its privileges, allowing it to
read and write local files, as well as to execute local applications with
the privileges of the user running the applet or application. (CVE-2009-2675)
It was discovered that JDK13Services grants unnecessary privileges to
certain object types. This could be misused by an untrusted applet or
application to use otherwise restricted functionality. (CVE-2009-2689)
An information disclosure flaw was found in the way private Java variables
were handled. An untrusted applet or application could use this flaw to
obtain information from variables that would otherwise be private.
(CVE-2009-2690)
Note: The flaws concerning applets in this advisory, CVE-2009-2475,
CVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673, CVE-2009-2675,
CVE-2009-2689, and CVE-2009-2690, can only be triggered in
java-1.6.0-openjdk by calling the "appletviewer" application.
This update also fixes the following bug:
* the EVR in the java-1.6.0-openjdk package as shipped with Red Hat
Enterprise Linux allowed the java-1.6.0-openjdk package from the EPEL
repository to take precedence (appear newer). Users using
java-1.6.0-openjdk from EPEL would not have received security updates since
October 2008. This update prevents the packages from EPEL from taking
precedence. (BZ#499079)
All users of java-1.6.0-openjdk are advised to upgrade to these updated
packages, which resolve these issues. All running instances of OpenJDK Java
must be restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-openjdk packages that fix several security issues and a\nbug are now available for Red Hat Enterprise Linux 5.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "These packages provide the OpenJDK 6 Java Runtime Environment and the\nOpenJDK 6 Software Development Kit. The Java Runtime Environment (JRE)\ncontains the software and tools that users need to run applications written\nusing the Java programming language.\n\nA flaw was found in the way the XML Digital Signature implementation in the\nJRE handled HMAC-based XML signatures. An attacker could use this flaw to\ncreate a crafted signature that could allow them to bypass authentication,\nor trick a user, applet, or application into accepting untrusted content.\n(CVE-2009-0217)\n\nSeveral potential information leaks were found in various mutable static\nvariables. These could be exploited in application scenarios that execute\nuntrusted scripting code. (CVE-2009-2475)\n\nIt was discovered that OpenType checks can be bypassed. This could allow a\nrogue application to bypass access restrictions by acquiring references to\nprivileged objects through finalizer resurrection. (CVE-2009-2476)\n\nA denial of service flaw was found in the way the JRE processes XML. A\nremote attacker could use this flaw to supply crafted XML that would lead\nto a denial of service. (CVE-2009-2625)\n\nA flaw was found in the JRE audio system. An untrusted applet or\napplication could use this flaw to gain read access to restricted System\nproperties. (CVE-2009-2670)\n\nTwo flaws were found in the JRE proxy implementation. An untrusted applet\nor application could use these flaws to discover the usernames of users\nrunning applets and applications, or obtain web browser cookies and use\nthem for session hijacking attacks. (CVE-2009-2671, CVE-2009-2672)\n\nAn additional flaw was found in the proxy mechanism implementation. This\nflaw allowed an untrusted applet or application to bypass access\nrestrictions and communicate using non-authorized socket or URL connections\nto hosts other than the origin host. (CVE-2009-2673) \n\nAn integer overflow flaw was found in the way the JRE processes JPEG\nimages. An untrusted application could use this flaw to extend its\nprivileges, allowing it to read and write local files, as well as to\nexecute local applications with the privileges of the user running the\napplication. (CVE-2009-2674)\n\nAn integer overflow flaw was found in the JRE unpack200 functionality. An\nuntrusted applet or application could extend its privileges, allowing it to\nread and write local files, as well as to execute local applications with\nthe privileges of the user running the applet or application. (CVE-2009-2675)\n\nIt was discovered that JDK13Services grants unnecessary privileges to\ncertain object types. This could be misused by an untrusted applet or\napplication to use otherwise restricted functionality. (CVE-2009-2689)\n\nAn information disclosure flaw was found in the way private Java variables\nwere handled. An untrusted applet or application could use this flaw to\nobtain information from variables that would otherwise be private.\n(CVE-2009-2690)\n\nNote: The flaws concerning applets in this advisory, CVE-2009-2475,\nCVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673, CVE-2009-2675,\nCVE-2009-2689, and CVE-2009-2690, can only be triggered in\njava-1.6.0-openjdk by calling the \"appletviewer\" application.\n\nThis update also fixes the following bug:\n\n* the EVR in the java-1.6.0-openjdk package as shipped with Red Hat\nEnterprise Linux allowed the java-1.6.0-openjdk package from the EPEL\nrepository to take precedence (appear newer). Users using\njava-1.6.0-openjdk from EPEL would not have received security updates since\nOctober 2008. This update prevents the packages from EPEL from taking\nprecedence. (BZ#499079)\n\nAll users of java-1.6.0-openjdk are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of OpenJDK Java\nmust be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1201", "url": "https://access.redhat.com/errata/RHSA-2009:1201" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5", "url": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5" }, { "category": "external", "summary": "499079", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=499079" }, { "category": "external", "summary": "511915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915" }, { "category": "external", "summary": "512896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896" }, { "category": "external", "summary": "512907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907" }, { "category": "external", "summary": "512914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914" }, { "category": "external", "summary": "512915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915" }, { "category": "external", "summary": "512920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920" }, { "category": "external", "summary": "512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "513215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215" }, { "category": "external", "summary": "513220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513220" }, { "category": "external", "summary": "513222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222" }, { "category": "external", "summary": "513223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1201.json" } ], "title": "Red Hat Security Advisory: java-1.6.0-openjdk security and bug fix update", "tracking": { "current_release_date": "2024-11-14T10:47:06+00:00", "generator": { "date": "2024-11-14T10:47:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2009:1201", "initial_release_date": "2009-08-06T21:14:00+00:00", "revision_history": [ { "date": "2009-08-06T21:14:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-08-06T17:14:44+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:47:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.2.b09.el5?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.2.b09.el5?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.2.b09.el5?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0217", "discovery_date": "2009-07-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "511915" } ], "notes": [ { "category": "description", "text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0217" }, { "category": "external", "summary": "RHBZ#511915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0217" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217" } ], "release_date": "2009-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T21:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1201" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass" }, { "cve": "CVE-2009-2475", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "513215" } ], "notes": [ { "category": "description", "text": "Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2475" }, { "category": "external", "summary": "RHBZ#513215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2475", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T21:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1201" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)" }, { "cve": "CVE-2009-2476", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "513220" } ], "notes": [ { "category": "description", "text": "The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK OpenType checks can be bypassed (6736293)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2476" }, { "category": "external", "summary": "RHBZ#513220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513220" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2476", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2476" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T21:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1201" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK OpenType checks can be bypassed (6736293)" }, { "cve": "CVE-2009-2625", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512921" } ], "notes": [ { "category": "description", "text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: XML parsing Denial-Of-Service (6845701)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2625" }, { "category": "external", "summary": "RHBZ#512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T21:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1201" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: XML parsing Denial-Of-Service (6845701)" }, { "cve": "CVE-2009-2670", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512896" } ], "notes": [ { "category": "description", "text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Untrusted applet System properties access (6738524)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2670" }, { "category": "external", "summary": "RHBZ#512896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2670" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T21:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1201" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK Untrusted applet System properties access (6738524)" }, { "cve": "CVE-2009-2671", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512907" } ], "notes": [ { "category": "description", "text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Proxy mechanism information leaks (6801071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2671" }, { "category": "external", "summary": "RHBZ#512907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2671" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T21:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1201" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Proxy mechanism information leaks (6801071)" }, { "cve": "CVE-2009-2672", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512907" } ], "notes": [ { "category": "description", "text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Proxy mechanism information leaks (6801071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2672" }, { "category": "external", "summary": "RHBZ#512907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T21:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1201" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Proxy mechanism information leaks (6801071)" }, { "cve": "CVE-2009-2673", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512914" } ], "notes": [ { "category": "description", "text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2673" }, { "category": "external", "summary": "RHBZ#512914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2673" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T21:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1201" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)" }, { "cve": "CVE-2009-2674", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512915" } ], "notes": [ { "category": "description", "text": "Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start Buffer JPEG processing integer overflow (6823373)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2674" }, { "category": "external", "summary": "RHBZ#512915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2674", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2674" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T21:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1201" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java Web Start Buffer JPEG processing integer overflow (6823373)" }, { "cve": "CVE-2009-2675", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512920" } ], "notes": [ { "category": "description", "text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2675" }, { "category": "external", "summary": "RHBZ#512920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T21:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1201" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)" }, { "cve": "CVE-2009-2689", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "513222" } ], "notes": [ { "category": "description", "text": "JDK13Services.getProviders in Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, grants full privileges to instances of unspecified object types, which allows context-dependent attackers to bypass intended access restrictions via an untrusted (1) applet or (2) application.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK JDK13Services grants unnecessary privileges (6777448)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2689" }, { "category": "external", "summary": "RHBZ#513222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513222" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2689", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2689" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2689", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2689" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T21:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1201" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK JDK13Services grants unnecessary privileges (6777448)" }, { "cve": "CVE-2009-2690", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "513223" } ], "notes": [ { "category": "description", "text": "The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK private variable information disclosure (6777487)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2690" }, { "category": "external", "summary": "RHBZ#513223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2690", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2690" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T21:14:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1201" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Client:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.src", "5Server:java-1.6.0-openjdk-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.2.b09.el5.x86_64", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.i386", "5Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.2.b09.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK private variable information disclosure (6777487)" } ] }
rhsa-2009_1200
Vulnerability from csaf_redhat
Published
2009-08-06 20:41
Modified
2024-11-14 10:46
Summary
Red Hat Security Advisory: java-1.6.0-sun security update
Notes
Topic
Updated java-1.6.0-sun packages that correct several security issues are
now available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
Details
The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and
the Sun Java 6 Software Development Kit.
This update fixes several vulnerabilities in the Sun Java 6 Runtime
Environment and the Sun Java 6 Software Development Kit. These
vulnerabilities are summarized on the "Advance notification of Security
Updates for Java SE" page from Sun Microsystems, listed in the References
section. (CVE-2009-0217, CVE-2009-2475, CVE-2009-2476, CVE-2009-2625,
CVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673, CVE-2009-2674,
CVE-2009-2675, CVE-2009-2676, CVE-2009-2690)
Users of java-1.6.0-sun should upgrade to these updated packages, which
correct these issues. All running instances of Sun Java must be restarted
for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-sun packages that correct several security issues are\nnow available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.\n\nThis update has been rated as having critical security impact by the Red\nHat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and\nthe Sun Java 6 Software Development Kit.\n\nThis update fixes several vulnerabilities in the Sun Java 6 Runtime\nEnvironment and the Sun Java 6 Software Development Kit. These\nvulnerabilities are summarized on the \"Advance notification of Security\nUpdates for Java SE\" page from Sun Microsystems, listed in the References\nsection. (CVE-2009-0217, CVE-2009-2475, CVE-2009-2476, CVE-2009-2625,\nCVE-2009-2670, CVE-2009-2671, CVE-2009-2672, CVE-2009-2673, CVE-2009-2674,\nCVE-2009-2675, CVE-2009-2676, CVE-2009-2690)\n\nUsers of java-1.6.0-sun should upgrade to these updated packages, which\ncorrect these issues. All running instances of Sun Java must be restarted\nfor the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2009:1200", "url": "https://access.redhat.com/errata/RHSA-2009:1200" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5", "url": "http://blogs.sun.com/security/entry/advance_notification_of_security_updates5" }, { "category": "external", "summary": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125139-16-1" }, { "category": "external", "summary": "511915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915" }, { "category": "external", "summary": "512896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896" }, { "category": "external", "summary": "512907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907" }, { "category": "external", "summary": "512914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914" }, { "category": "external", "summary": "512915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915" }, { "category": "external", "summary": "512920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920" }, { "category": "external", "summary": "512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "513215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215" }, { "category": "external", "summary": "513220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513220" }, { "category": "external", "summary": "513223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223" }, { "category": "external", "summary": "515890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2009/rhsa-2009_1200.json" } ], "title": "Red Hat Security Advisory: java-1.6.0-sun security update", "tracking": { "current_release_date": "2024-11-14T10:46:51+00:00", "generator": { "date": "2024-11-14T10:46:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2009:1200", "initial_release_date": "2009-08-06T20:41:00+00:00", "revision_history": [ { "date": "2009-08-06T20:41:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2009-08-06T16:41:36+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:46:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.15-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.15-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.15-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.15-1jpp.1.el5?arch=i586\u0026epoch=1" } } } ], "category": "architecture", "name": "i586" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0217", "discovery_date": "2009-07-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "511915" } ], "notes": [ { "category": "description", "text": "The design of the W3C XML Signature Syntax and Processing (XMLDsig) recommendation, as implemented in products including (1) the Oracle Security Developer Tools component in Oracle Application Server 10.1.2.3, 10.1.3.4, and 10.1.4.3IM; (2) the WebLogic Server component in BEA Product Suite 10.3, 10.0 MP1, 9.2 MP3, 9.1, 9.0, and 8.1 SP6; (3) Mono before 2.4.2.2; (4) XML Security Library before 1.2.12; (5) IBM WebSphere Application Server Versions 6.0 through 6.0.2.33, 6.1 through 6.1.0.23, and 7.0 through 7.0.0.1; (6) Sun JDK and JRE Update 14 and earlier; (7) Microsoft .NET Framework 3.0 through 3.0 SP2, 3.5, and 4.0; and other products uses a parameter that defines an HMAC truncation length (HMACOutputLength) but does not require a minimum for this length, which allows attackers to spoof HMAC-based signatures and bypass authentication by specifying a truncation length with a small number of bits.", "title": "Vulnerability description" }, { "category": "summary", "text": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-0217" }, { "category": "external", "summary": "RHBZ#511915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=511915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-0217", "url": "https://www.cve.org/CVERecord?id=CVE-2009-0217" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-0217" } ], "release_date": "2009-07-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1200" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "xml-security-1.3.0-1jpp.ep1.*: XMLDsig HMAC-based signatures spoofing and authentication bypass" }, { "cve": "CVE-2009-2475", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "513215" } ], "notes": [ { "category": "description", "text": "Sun Java SE 5.0 before Update 20 and 6 before Update 15, and OpenJDK, might allow context-dependent attackers to obtain sensitive information via vectors involving static variables that are declared without the final keyword, related to (1) LayoutQueue, (2) Cursor.predefined, (3) AccessibleResourceBundle.getContents, (4) ImageReaderSpi.STANDARD_INPUT_TYPE, (5) ImageWriterSpi.STANDARD_OUTPUT_TYPE, (6) the imageio plugins, (7) DnsContext.debug, (8) RmfFileReader/StandardMidiFileWriter.types, (9) AbstractSaslImpl.logger, (10) Synth.Region.uiToRegionMap/lowerCaseNameMap, (11) the Introspector class and a cache of BeanInfo, and (12) JAX-WS, a different vulnerability than CVE-2009-2673.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2475" }, { "category": "external", "summary": "RHBZ#513215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513215" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2475", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2475" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1200" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK information leaks in mutable variables (6588003,6656586,6656610,6656625,6657133,6657619,6657625,6657695,6660049,6660539,6813167)" }, { "cve": "CVE-2009-2476", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "513220" } ], "notes": [ { "category": "description", "text": "The Java Management Extensions (JMX) implementation in Sun Java SE 6 before Update 15, and OpenJDK, does not properly enforce OpenType checks, which allows context-dependent attackers to bypass intended access restrictions by leveraging finalizer resurrection to obtain a reference to a privileged object.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK OpenType checks can be bypassed (6736293)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2476" }, { "category": "external", "summary": "RHBZ#513220", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513220" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2476", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2476" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1200" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK OpenType checks can be bypassed (6736293)" }, { "cve": "CVE-2009-2625", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512921" } ], "notes": [ { "category": "description", "text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: XML parsing Denial-Of-Service (6845701)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2625" }, { "category": "external", "summary": "RHBZ#512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1200" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: XML parsing Denial-Of-Service (6845701)" }, { "cve": "CVE-2009-2670", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512896" } ], "notes": [ { "category": "description", "text": "The audio system in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to java.lang.System properties by (1) untrusted applets and (2) Java Web Start applications, which allows context-dependent attackers to obtain sensitive information by reading these properties.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Untrusted applet System properties access (6738524)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2670" }, { "category": "external", "summary": "RHBZ#512896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2670", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2670" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2670" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1200" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK Untrusted applet System properties access (6738524)" }, { "cve": "CVE-2009-2671", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512907" } ], "notes": [ { "category": "description", "text": "The SOCKS proxy implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to discover the username of the account that invoked an untrusted (1) applet or (2) Java Web Start application via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Proxy mechanism information leaks (6801071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2671" }, { "category": "external", "summary": "RHBZ#512907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2671", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2671" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2671" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1200" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Proxy mechanism information leaks (6801071)" }, { "cve": "CVE-2009-2672", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512907" } ], "notes": [ { "category": "description", "text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, does not prevent access to browser cookies by untrusted (1) applets and (2) Java Web Start applications, which allows remote attackers to hijack web sessions via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Proxy mechanism information leaks (6801071)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2672" }, { "category": "external", "summary": "RHBZ#512907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2672", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2672" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2672" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1200" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Proxy mechanism information leaks (6801071)" }, { "cve": "CVE-2009-2673", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512914" } ], "notes": [ { "category": "description", "text": "The proxy mechanism implementation in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows remote attackers to bypass intended access restrictions and connect to arbitrary sites via unspecified vectors, related to a declaration that lacks the final keyword.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2673" }, { "category": "external", "summary": "RHBZ#512914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512914" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2673", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2673" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2673" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1200" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK proxy mechanism allows non-authorized socket connections (6801497)" }, { "cve": "CVE-2009-2674", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512915" } ], "notes": [ { "category": "description", "text": "Integer overflow in javaws.exe in Sun Java Web Start in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 allows context-dependent attackers to execute arbitrary code via a crafted JPEG image that is not properly handled during display to a splash screen, which triggers a heap-based buffer overflow.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start Buffer JPEG processing integer overflow (6823373)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2674" }, { "category": "external", "summary": "RHBZ#512915", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512915" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2674", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2674" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2674" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1200" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java Web Start Buffer JPEG processing integer overflow (6823373)" }, { "cve": "CVE-2009-2675", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512920" } ], "notes": [ { "category": "description", "text": "Integer overflow in the unpack200 utility in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15, and JDK and JRE 5.0 before Update 20, allows context-dependent attackers to gain privileges via unspecified length fields in the header of a Pack200-compressed JAR file, which leads to a heap-based buffer overflow during decompression.", "title": "Vulnerability description" }, { "category": "summary", "text": "Java Web Start Buffer unpack200 processing integer overflow (6830335)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2675" }, { "category": "external", "summary": "RHBZ#512920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512920" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2675", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2675" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2675" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1200" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "Java Web Start Buffer unpack200 processing integer overflow (6830335)" }, { "cve": "CVE-2009-2676", "discovery_date": "2009-08-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "515890" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in JNLPAppletlauncher in Sun Java SE, and SE for Business, in JDK and JRE 6 Update 14 and earlier and JDK and JRE 5.0 Update 19 and earlier; and Java SE for Business in SDK and JRE 1.4.2_21 and earlier; allows remote attackers to create or modify arbitrary files via vectors involving an untrusted Java applet that accesses an old version of JNLPAppletLauncher.", "title": "Vulnerability description" }, { "category": "summary", "text": "JRE applet launcher vulnerability", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2676" }, { "category": "external", "summary": "RHBZ#515890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=515890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2676", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2676" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2676" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1200" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JRE applet launcher vulnerability" }, { "cve": "CVE-2009-2690", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "513223" } ], "notes": [ { "category": "description", "text": "The encoder in Sun Java SE 6 before Update 15, and OpenJDK, grants read access to private variables with unspecified names, which allows context-dependent attackers to obtain sensitive information via an untrusted (1) applet or (2) application.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK private variable information disclosure (6777487)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2690" }, { "category": "external", "summary": "RHBZ#513223", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=513223" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2690", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2690" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2690", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2690" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1200" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK private variable information disclosure (6777487)" }, { "cve": "CVE-2009-2716", "discovery_date": "2009-08-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "516812" } ], "notes": [ { "category": "description", "text": "The plugin functionality in Sun Java SE 6 before Update 15 does not properly implement version selection, which allows context-dependent attackers to leverage vulnerabilities in \"old zip and certificate handling\" and have unspecified other impact via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK improper version selection", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2716" }, { "category": "external", "summary": "RHBZ#516812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516812" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2716", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2716" } ], "release_date": "2009-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1200" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK improper version selection" }, { "cve": "CVE-2009-2718", "discovery_date": "2009-08-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "516815" } ], "notes": [ { "category": "description", "text": "The Abstract Window Toolkit (AWT) implementation in Sun Java SE 6 before Update 15 on X11 does not impose the intended constraint on distance from the window border to the Security Warning Icon, which makes it easier for context-dependent attackers to trick a user into interacting unsafely with an untrusted applet.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK reposition of untrusted applet security icon in X11", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2718" }, { "category": "external", "summary": "RHBZ#516815", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516815" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2718", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2718" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2718", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2718" } ], "release_date": "2009-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1200" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK reposition of untrusted applet security icon in X11" }, { "cve": "CVE-2009-2719", "discovery_date": "2009-08-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "516820" } ], "notes": [ { "category": "description", "text": "The Java Web Start implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException) via a crafted .jnlp file, as demonstrated by the jnlp_file/appletDesc/index.html#misc test in the Technology Compatibility Kit (TCK) for the Java Network Launching Protocol (JNLP).", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK DoS with crafted .jnlp file", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2719" }, { "category": "external", "summary": "RHBZ#516820", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516820" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2719", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2719" } ], "release_date": "2009-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1200" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JDK DoS with crafted .jnlp file" }, { "cve": "CVE-2009-2720", "discovery_date": "2009-08-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "516823" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the javax.swing.plaf.synth.SynthContext.isSubregion method in the Swing implementation in Sun Java SE 6 before Update 15 allows context-dependent attackers to cause a denial of service (NullPointerException in the Jemmy library) via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK DoS with Swing Synthcontext implementation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2720" }, { "category": "external", "summary": "RHBZ#516823", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=516823" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2720", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2720" } ], "release_date": "2009-08-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2009-08-06T20:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied.\n\nThis update is available via Red Hat Network. Details on how to use\nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2009:1200" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 1.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.15-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.15-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JDK DoS with Swing Synthcontext implementation" } ] }
rhsa-2011_0858
Vulnerability from csaf_redhat
Published
2011-06-08 14:36
Modified
2024-11-14 10:50
Summary
Red Hat Security Advisory: xerces-j2 security update
Notes
Topic
Updated xerces-j2 packages that fix one security issue are now available
for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
The xerces-j2 packages provide the Apache Xerces2 Java Parser, a
high-performance XML parser. A Document Type Definition (DTD) defines the
legal syntax (and also which elements can be used) for certain types of
files, such as XML files.
A flaw was found in the way the Apache Xerces2 Java Parser processed the
SYSTEM identifier in DTDs. A remote attacker could provide a
specially-crafted XML file, which once parsed by an application using the
Apache Xerces2 Java Parser, would lead to a denial of service (application
hang due to excessive CPU use). (CVE-2009-2625)
Users should upgrade to these updated packages, which contain a backported
patch to correct this issue. Applications using the Apache Xerces2 Java
Parser must be restarted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated xerces-j2 packages that fix one security issue are now available\nfor Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The xerces-j2 packages provide the Apache Xerces2 Java Parser, a\nhigh-performance XML parser. A Document Type Definition (DTD) defines the\nlegal syntax (and also which elements can be used) for certain types of\nfiles, such as XML files.\n\nA flaw was found in the way the Apache Xerces2 Java Parser processed the\nSYSTEM identifier in DTDs. A remote attacker could provide a\nspecially-crafted XML file, which once parsed by an application using the\nApache Xerces2 Java Parser, would lead to a denial of service (application\nhang due to excessive CPU use). (CVE-2009-2625)\n\nUsers should upgrade to these updated packages, which contain a backported\npatch to correct this issue. Applications using the Apache Xerces2 Java\nParser must be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0858", "url": "https://access.redhat.com/errata/RHSA-2011:0858" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0858.json" } ], "title": "Red Hat Security Advisory: xerces-j2 security update", "tracking": { "current_release_date": "2024-11-14T10:50:39+00:00", "generator": { "date": "2024-11-14T10:50:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2011:0858", "initial_release_date": "2011-06-08T14:36:00+00:00", "revision_history": [ { "date": "2011-06-08T14:36:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-06-08T10:42:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T10:50:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "product": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "product_id": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-xni@2.7.1-12.6.el6_0?arch=i686" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "product": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "product_id": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-apis@2.7.1-12.6.el6_0?arch=i686" } } }, { "category": "product_version", "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "product": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "product_id": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-debuginfo@2.7.1-12.6.el6_0?arch=i686" } } }, { "category": "product_version", "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "product": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "product_id": "xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-demo@2.7.1-12.6.el6_0?arch=i686" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "product": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "product_id": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-other@2.7.1-12.6.el6_0?arch=i686" } } }, { "category": "product_version", "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "product": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "product_id": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-scripts@2.7.1-12.6.el6_0?arch=i686" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "product": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "product_id": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-impl@2.7.1-12.6.el6_0?arch=i686" } } }, { "category": "product_version", "name": "xerces-j2-0:2.7.1-12.6.el6_0.i686", "product": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.i686", "product_id": "xerces-j2-0:2.7.1-12.6.el6_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2@2.7.1-12.6.el6_0?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "product": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "product_id": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-xni@2.7.1-12.6.el6_0?arch=ppc64" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "product": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "product_id": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-apis@2.7.1-12.6.el6_0?arch=ppc64" } } }, { "category": "product_version", "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "product": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "product_id": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-debuginfo@2.7.1-12.6.el6_0?arch=ppc64" } } }, { "category": "product_version", "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "product": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "product_id": "xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-demo@2.7.1-12.6.el6_0?arch=ppc64" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "product": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "product_id": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-other@2.7.1-12.6.el6_0?arch=ppc64" } } }, { "category": "product_version", "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "product": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "product_id": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-scripts@2.7.1-12.6.el6_0?arch=ppc64" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "product": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "product_id": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-impl@2.7.1-12.6.el6_0?arch=ppc64" } } }, { "category": "product_version", "name": "xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "product": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "product_id": "xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2@2.7.1-12.6.el6_0?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "product": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "product_id": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-xni@2.7.1-12.6.el6_0?arch=s390x" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "product": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "product_id": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-apis@2.7.1-12.6.el6_0?arch=s390x" } } }, { "category": "product_version", "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "product": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "product_id": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-debuginfo@2.7.1-12.6.el6_0?arch=s390x" } } }, { "category": "product_version", "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "product": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "product_id": "xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-demo@2.7.1-12.6.el6_0?arch=s390x" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "product": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "product_id": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-other@2.7.1-12.6.el6_0?arch=s390x" } } }, { "category": "product_version", "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "product": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "product_id": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-scripts@2.7.1-12.6.el6_0?arch=s390x" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "product": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "product_id": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-impl@2.7.1-12.6.el6_0?arch=s390x" } } }, { "category": "product_version", "name": "xerces-j2-0:2.7.1-12.6.el6_0.s390x", "product": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.s390x", "product_id": "xerces-j2-0:2.7.1-12.6.el6_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2@2.7.1-12.6.el6_0?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "product": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "product_id": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-xni@2.7.1-12.6.el6_0?arch=x86_64" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "product": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "product_id": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-apis@2.7.1-12.6.el6_0?arch=x86_64" } } }, { "category": "product_version", "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "product": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "product_id": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-debuginfo@2.7.1-12.6.el6_0?arch=x86_64" } } }, { "category": "product_version", "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "product": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "product_id": "xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-demo@2.7.1-12.6.el6_0?arch=x86_64" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "product": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "product_id": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-other@2.7.1-12.6.el6_0?arch=x86_64" } } }, { "category": "product_version", "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64", "product": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64", "product_id": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-scripts@2.7.1-12.6.el6_0?arch=x86_64" } } }, { "category": "product_version", "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "product": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "product_id": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2-javadoc-impl@2.7.1-12.6.el6_0?arch=x86_64" } } }, { "category": "product_version", "name": "xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "product": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "product_id": "xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2@2.7.1-12.6.el6_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "xerces-j2-0:2.7.1-12.6.el6_0.src", "product": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.src", "product_id": "xerces-j2-0:2.7.1-12.6.el6_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/xerces-j2@2.7.1-12.6.el6_0?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-0:2.7.1-12.6.el6_0.src" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.src", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-0:2.7.1-12.6.el6_0.src" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.src", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-0:2.7.1-12.6.el6_0.src" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.src", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-0:2.7.1-12.6.el6_0.src" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-demo-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-0:2.7.1-12.6.el6_0.src" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.src", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-0:2.7.1-12.6.el6_0.src" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-demo-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686" }, "product_reference": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64" }, "product_reference": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x" }, "product_reference": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64" }, "product_reference": "xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-2625", "discovery_date": "2009-07-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "512921" } ], "notes": [ { "category": "description", "text": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK: XML parsing Denial-Of-Service (6845701)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:xerces-j2-0:2.7.1-12.6.el6_0.i686", "6Client-optional:xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "6Client-optional:xerces-j2-0:2.7.1-12.6.el6_0.s390x", "6Client-optional:xerces-j2-0:2.7.1-12.6.el6_0.src", "6Client-optional:xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "6Client-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "6Client-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "6Client-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "6Client-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "6Client-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "6Client-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "6Client-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "6Client-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "6Client-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "6Client-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "6Client-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "6Client-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "6Client-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "6Client-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "6Client-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "6Client-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "6Client-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "6Client-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "6Client-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "6Client-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "6Client-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "6Client-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "6Client-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "6Client-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "6Client-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "6Client-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "6Client-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "6Client-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64", "6ComputeNode-optional:xerces-j2-0:2.7.1-12.6.el6_0.i686", "6ComputeNode-optional:xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "6ComputeNode-optional:xerces-j2-0:2.7.1-12.6.el6_0.s390x", "6ComputeNode-optional:xerces-j2-0:2.7.1-12.6.el6_0.src", "6ComputeNode-optional:xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "6ComputeNode-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "6ComputeNode-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "6ComputeNode-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "6ComputeNode-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "6ComputeNode-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "6ComputeNode-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "6ComputeNode-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "6ComputeNode-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "6ComputeNode-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "6ComputeNode-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "6ComputeNode-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "6ComputeNode-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "6ComputeNode-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "6ComputeNode-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "6ComputeNode-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "6ComputeNode-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "6ComputeNode-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "6ComputeNode-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "6ComputeNode-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "6ComputeNode-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "6ComputeNode-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "6ComputeNode-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "6ComputeNode-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "6ComputeNode-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "6ComputeNode-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "6ComputeNode-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "6ComputeNode-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "6ComputeNode-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64", "6Server-optional:xerces-j2-0:2.7.1-12.6.el6_0.i686", "6Server-optional:xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "6Server-optional:xerces-j2-0:2.7.1-12.6.el6_0.s390x", "6Server-optional:xerces-j2-0:2.7.1-12.6.el6_0.src", "6Server-optional:xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "6Server-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "6Server-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "6Server-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "6Server-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "6Server-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "6Server-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "6Server-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "6Server-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "6Server-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "6Server-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "6Server-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "6Server-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "6Server-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "6Server-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "6Server-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "6Server-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "6Server-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "6Server-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "6Server-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "6Server-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "6Server-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "6Server-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "6Server-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "6Server-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "6Server-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "6Server-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "6Server-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "6Server-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64", "6Server:xerces-j2-0:2.7.1-12.6.el6_0.i686", "6Server:xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "6Server:xerces-j2-0:2.7.1-12.6.el6_0.s390x", "6Server:xerces-j2-0:2.7.1-12.6.el6_0.src", "6Server:xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "6Server:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "6Server:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "6Server:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "6Server:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "6Server:xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "6Server:xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "6Server:xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "6Server:xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "6Server:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "6Server:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "6Server:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "6Server:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "6Server:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "6Server:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "6Server:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "6Server:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "6Server:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "6Server:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "6Server:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "6Server:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "6Server:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "6Server:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "6Server:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "6Server:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "6Server:xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "6Server:xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "6Server:xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "6Server:xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64", "6Workstation-optional:xerces-j2-0:2.7.1-12.6.el6_0.i686", "6Workstation-optional:xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "6Workstation-optional:xerces-j2-0:2.7.1-12.6.el6_0.s390x", "6Workstation-optional:xerces-j2-0:2.7.1-12.6.el6_0.src", "6Workstation-optional:xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "6Workstation-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "6Workstation-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "6Workstation-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "6Workstation-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "6Workstation-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "6Workstation-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "6Workstation-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "6Workstation-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "6Workstation-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "6Workstation-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "6Workstation-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "6Workstation-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "6Workstation-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "6Workstation-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "6Workstation-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "6Workstation-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "6Workstation-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "6Workstation-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "6Workstation-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "6Workstation-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "6Workstation-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "6Workstation-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "6Workstation-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "6Workstation-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "6Workstation-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "6Workstation-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "6Workstation-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "6Workstation-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64", "6Workstation:xerces-j2-0:2.7.1-12.6.el6_0.i686", "6Workstation:xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "6Workstation:xerces-j2-0:2.7.1-12.6.el6_0.s390x", "6Workstation:xerces-j2-0:2.7.1-12.6.el6_0.src", "6Workstation:xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "6Workstation:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "6Workstation:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "6Workstation:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "6Workstation:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "6Workstation:xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "6Workstation:xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "6Workstation:xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "6Workstation:xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "6Workstation:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "6Workstation:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "6Workstation:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "6Workstation:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "6Workstation:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "6Workstation:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "6Workstation:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "6Workstation:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "6Workstation:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "6Workstation:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "6Workstation:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "6Workstation:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "6Workstation:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "6Workstation:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "6Workstation:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "6Workstation:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "6Workstation:xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "6Workstation:xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "6Workstation:xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "6Workstation:xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-2625" }, { "category": "external", "summary": "RHBZ#512921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-2625", "url": "https://www.cve.org/CVERecord?id=CVE-2009-2625" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625" } ], "release_date": "2009-08-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-08T14:36:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-optional:xerces-j2-0:2.7.1-12.6.el6_0.i686", "6Client-optional:xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "6Client-optional:xerces-j2-0:2.7.1-12.6.el6_0.s390x", "6Client-optional:xerces-j2-0:2.7.1-12.6.el6_0.src", "6Client-optional:xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "6Client-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "6Client-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "6Client-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "6Client-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "6Client-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "6Client-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "6Client-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "6Client-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "6Client-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "6Client-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "6Client-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "6Client-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "6Client-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "6Client-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "6Client-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "6Client-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "6Client-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "6Client-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "6Client-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "6Client-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "6Client-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "6Client-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "6Client-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "6Client-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "6Client-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "6Client-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "6Client-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "6Client-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64", "6ComputeNode-optional:xerces-j2-0:2.7.1-12.6.el6_0.i686", "6ComputeNode-optional:xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "6ComputeNode-optional:xerces-j2-0:2.7.1-12.6.el6_0.s390x", "6ComputeNode-optional:xerces-j2-0:2.7.1-12.6.el6_0.src", "6ComputeNode-optional:xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "6ComputeNode-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "6ComputeNode-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "6ComputeNode-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "6ComputeNode-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "6ComputeNode-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "6ComputeNode-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "6ComputeNode-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "6ComputeNode-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "6ComputeNode-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "6ComputeNode-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "6ComputeNode-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "6ComputeNode-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "6ComputeNode-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "6ComputeNode-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "6ComputeNode-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "6ComputeNode-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "6ComputeNode-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "6ComputeNode-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "6ComputeNode-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "6ComputeNode-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "6ComputeNode-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "6ComputeNode-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "6ComputeNode-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "6ComputeNode-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "6ComputeNode-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "6ComputeNode-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "6ComputeNode-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "6ComputeNode-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64", "6Server-optional:xerces-j2-0:2.7.1-12.6.el6_0.i686", "6Server-optional:xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "6Server-optional:xerces-j2-0:2.7.1-12.6.el6_0.s390x", "6Server-optional:xerces-j2-0:2.7.1-12.6.el6_0.src", "6Server-optional:xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "6Server-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "6Server-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "6Server-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "6Server-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "6Server-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "6Server-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "6Server-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "6Server-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "6Server-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "6Server-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "6Server-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "6Server-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "6Server-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "6Server-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "6Server-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "6Server-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "6Server-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "6Server-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "6Server-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "6Server-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "6Server-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "6Server-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "6Server-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "6Server-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "6Server-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "6Server-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "6Server-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "6Server-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64", "6Server:xerces-j2-0:2.7.1-12.6.el6_0.i686", "6Server:xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "6Server:xerces-j2-0:2.7.1-12.6.el6_0.s390x", "6Server:xerces-j2-0:2.7.1-12.6.el6_0.src", "6Server:xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "6Server:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "6Server:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "6Server:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "6Server:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "6Server:xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "6Server:xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "6Server:xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "6Server:xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "6Server:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "6Server:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "6Server:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "6Server:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "6Server:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "6Server:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "6Server:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "6Server:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "6Server:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "6Server:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "6Server:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "6Server:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "6Server:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "6Server:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "6Server:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "6Server:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "6Server:xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "6Server:xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "6Server:xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "6Server:xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64", "6Workstation-optional:xerces-j2-0:2.7.1-12.6.el6_0.i686", "6Workstation-optional:xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "6Workstation-optional:xerces-j2-0:2.7.1-12.6.el6_0.s390x", "6Workstation-optional:xerces-j2-0:2.7.1-12.6.el6_0.src", "6Workstation-optional:xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "6Workstation-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "6Workstation-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "6Workstation-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "6Workstation-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "6Workstation-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "6Workstation-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "6Workstation-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "6Workstation-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "6Workstation-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "6Workstation-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "6Workstation-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "6Workstation-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "6Workstation-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "6Workstation-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "6Workstation-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "6Workstation-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "6Workstation-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "6Workstation-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "6Workstation-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "6Workstation-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "6Workstation-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "6Workstation-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "6Workstation-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "6Workstation-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "6Workstation-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "6Workstation-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "6Workstation-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "6Workstation-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64", "6Workstation:xerces-j2-0:2.7.1-12.6.el6_0.i686", "6Workstation:xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "6Workstation:xerces-j2-0:2.7.1-12.6.el6_0.s390x", "6Workstation:xerces-j2-0:2.7.1-12.6.el6_0.src", "6Workstation:xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "6Workstation:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "6Workstation:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "6Workstation:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "6Workstation:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "6Workstation:xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "6Workstation:xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "6Workstation:xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "6Workstation:xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "6Workstation:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "6Workstation:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "6Workstation:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "6Workstation:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "6Workstation:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "6Workstation:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "6Workstation:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "6Workstation:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "6Workstation:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "6Workstation:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "6Workstation:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "6Workstation:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "6Workstation:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "6Workstation:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "6Workstation:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "6Workstation:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "6Workstation:xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "6Workstation:xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "6Workstation:xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "6Workstation:xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0858" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-optional:xerces-j2-0:2.7.1-12.6.el6_0.i686", "6Client-optional:xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "6Client-optional:xerces-j2-0:2.7.1-12.6.el6_0.s390x", "6Client-optional:xerces-j2-0:2.7.1-12.6.el6_0.src", "6Client-optional:xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "6Client-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "6Client-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "6Client-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "6Client-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "6Client-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "6Client-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "6Client-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "6Client-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "6Client-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "6Client-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "6Client-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "6Client-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "6Client-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "6Client-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "6Client-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "6Client-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "6Client-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "6Client-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "6Client-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "6Client-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "6Client-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "6Client-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "6Client-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "6Client-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "6Client-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "6Client-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "6Client-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "6Client-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64", "6ComputeNode-optional:xerces-j2-0:2.7.1-12.6.el6_0.i686", "6ComputeNode-optional:xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "6ComputeNode-optional:xerces-j2-0:2.7.1-12.6.el6_0.s390x", "6ComputeNode-optional:xerces-j2-0:2.7.1-12.6.el6_0.src", "6ComputeNode-optional:xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "6ComputeNode-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "6ComputeNode-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "6ComputeNode-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "6ComputeNode-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "6ComputeNode-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "6ComputeNode-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "6ComputeNode-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "6ComputeNode-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "6ComputeNode-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "6ComputeNode-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "6ComputeNode-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "6ComputeNode-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "6ComputeNode-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "6ComputeNode-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "6ComputeNode-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "6ComputeNode-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "6ComputeNode-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "6ComputeNode-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "6ComputeNode-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "6ComputeNode-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "6ComputeNode-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "6ComputeNode-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "6ComputeNode-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "6ComputeNode-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "6ComputeNode-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "6ComputeNode-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "6ComputeNode-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "6ComputeNode-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64", "6Server-optional:xerces-j2-0:2.7.1-12.6.el6_0.i686", "6Server-optional:xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "6Server-optional:xerces-j2-0:2.7.1-12.6.el6_0.s390x", "6Server-optional:xerces-j2-0:2.7.1-12.6.el6_0.src", "6Server-optional:xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "6Server-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "6Server-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "6Server-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "6Server-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "6Server-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "6Server-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "6Server-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "6Server-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "6Server-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "6Server-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "6Server-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "6Server-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "6Server-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "6Server-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "6Server-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "6Server-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "6Server-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "6Server-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "6Server-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "6Server-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "6Server-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "6Server-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "6Server-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "6Server-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "6Server-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "6Server-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "6Server-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "6Server-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64", "6Server:xerces-j2-0:2.7.1-12.6.el6_0.i686", "6Server:xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "6Server:xerces-j2-0:2.7.1-12.6.el6_0.s390x", "6Server:xerces-j2-0:2.7.1-12.6.el6_0.src", "6Server:xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "6Server:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "6Server:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "6Server:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "6Server:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "6Server:xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "6Server:xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "6Server:xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "6Server:xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "6Server:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "6Server:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "6Server:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "6Server:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "6Server:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "6Server:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "6Server:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "6Server:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "6Server:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "6Server:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "6Server:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "6Server:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "6Server:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "6Server:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "6Server:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "6Server:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "6Server:xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "6Server:xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "6Server:xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "6Server:xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64", "6Workstation-optional:xerces-j2-0:2.7.1-12.6.el6_0.i686", "6Workstation-optional:xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "6Workstation-optional:xerces-j2-0:2.7.1-12.6.el6_0.s390x", "6Workstation-optional:xerces-j2-0:2.7.1-12.6.el6_0.src", "6Workstation-optional:xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "6Workstation-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "6Workstation-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "6Workstation-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "6Workstation-optional:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "6Workstation-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "6Workstation-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "6Workstation-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "6Workstation-optional:xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "6Workstation-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "6Workstation-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "6Workstation-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "6Workstation-optional:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "6Workstation-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "6Workstation-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "6Workstation-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "6Workstation-optional:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "6Workstation-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "6Workstation-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "6Workstation-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "6Workstation-optional:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "6Workstation-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "6Workstation-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "6Workstation-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "6Workstation-optional:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "6Workstation-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "6Workstation-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "6Workstation-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "6Workstation-optional:xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64", "6Workstation:xerces-j2-0:2.7.1-12.6.el6_0.i686", "6Workstation:xerces-j2-0:2.7.1-12.6.el6_0.ppc64", "6Workstation:xerces-j2-0:2.7.1-12.6.el6_0.s390x", "6Workstation:xerces-j2-0:2.7.1-12.6.el6_0.src", "6Workstation:xerces-j2-0:2.7.1-12.6.el6_0.x86_64", "6Workstation:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.i686", "6Workstation:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.ppc64", "6Workstation:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.s390x", "6Workstation:xerces-j2-debuginfo-0:2.7.1-12.6.el6_0.x86_64", "6Workstation:xerces-j2-demo-0:2.7.1-12.6.el6_0.i686", "6Workstation:xerces-j2-demo-0:2.7.1-12.6.el6_0.ppc64", "6Workstation:xerces-j2-demo-0:2.7.1-12.6.el6_0.s390x", "6Workstation:xerces-j2-demo-0:2.7.1-12.6.el6_0.x86_64", "6Workstation:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.i686", "6Workstation:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.ppc64", "6Workstation:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.s390x", "6Workstation:xerces-j2-javadoc-apis-0:2.7.1-12.6.el6_0.x86_64", "6Workstation:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.i686", "6Workstation:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.ppc64", "6Workstation:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.s390x", "6Workstation:xerces-j2-javadoc-impl-0:2.7.1-12.6.el6_0.x86_64", "6Workstation:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.i686", "6Workstation:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.ppc64", "6Workstation:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.s390x", "6Workstation:xerces-j2-javadoc-other-0:2.7.1-12.6.el6_0.x86_64", "6Workstation:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.i686", "6Workstation:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.ppc64", "6Workstation:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.s390x", "6Workstation:xerces-j2-javadoc-xni-0:2.7.1-12.6.el6_0.x86_64", "6Workstation:xerces-j2-scripts-0:2.7.1-12.6.el6_0.i686", "6Workstation:xerces-j2-scripts-0:2.7.1-12.6.el6_0.ppc64", "6Workstation:xerces-j2-scripts-0:2.7.1-12.6.el6_0.s390x", "6Workstation:xerces-j2-scripts-0:2.7.1-12.6.el6_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK: XML parsing Denial-Of-Service (6845701)" } ] }
wid-sec-w-2024-0068
Vulnerability from csaf_certbund
Published
2024-01-11 23:00
Modified
2024-01-17 23:00
Summary
IBM Business Automation Workflow: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM Business Automation Workflow ist eine Lösung zur Automatisierung von Arbeitsabläufen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Business Automation Workflow ausnutzen, um beliebigen Programmcode auszuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen oder Dateien zu manipulieren.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Business Automation Workflow ist eine L\u00f6sung zur Automatisierung von Arbeitsabl\u00e4ufen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Business Automation Workflow ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0068 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0068.json" }, { "category": "self", "summary": "WID-SEC-2024-0068 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0068" }, { "category": "external", "summary": "IBM Security Bulletin vom 2024-01-11", "url": "https://www.ibm.com/support/pages/node/7107037" }, { "category": "external", "summary": "IBM Security Bulletin 1288432 vom 2024-01-17", "url": "https://www.ibm.com/support/pages/node/7108718" } ], "source_lang": "en-US", "title": "IBM Business Automation Workflow: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-01-17T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:56:12.950+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0068", "initial_release_date": "2024-01-11T23:00:00.000+00:00", "revision_history": [ { "date": "2024-01-11T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-17T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Business Automation Workflow \u003c 23.0.2", "product": { "name": "IBM Business Automation Workflow \u003c 23.0.2", "product_id": "T032025", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:23.0.2" } } } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23437", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Dom4J\", \"JDOM\", \"Apache XMLBeans\", \"Apache POI\", \"Sun Java Runtime Environment (JRE)\", \"Wildfly\" sowie \" Apache Xerces2\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-01-11T23:00:00Z", "title": "CVE-2022-23437" }, { "cve": "CVE-2021-33813", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Dom4J\", \"JDOM\", \"Apache XMLBeans\", \"Apache POI\", \"Sun Java Runtime Environment (JRE)\", \"Wildfly\" sowie \" Apache Xerces2\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-01-11T23:00:00Z", "title": "CVE-2021-33813" }, { "cve": "CVE-2021-23926", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Dom4J\", \"JDOM\", \"Apache XMLBeans\", \"Apache POI\", \"Sun Java Runtime Environment (JRE)\", \"Wildfly\" sowie \" Apache Xerces2\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-01-11T23:00:00Z", "title": "CVE-2021-23926" }, { "cve": "CVE-2020-14338", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Dom4J\", \"JDOM\", \"Apache XMLBeans\", \"Apache POI\", \"Sun Java Runtime Environment (JRE)\", \"Wildfly\" sowie \" Apache Xerces2\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-01-11T23:00:00Z", "title": "CVE-2020-14338" }, { "cve": "CVE-2020-10683", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Dom4J\", \"JDOM\", \"Apache XMLBeans\", \"Apache POI\", \"Sun Java Runtime Environment (JRE)\", \"Wildfly\" sowie \" Apache Xerces2\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-01-11T23:00:00Z", "title": "CVE-2020-10683" }, { "cve": "CVE-2019-12415", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Dom4J\", \"JDOM\", \"Apache XMLBeans\", \"Apache POI\", \"Sun Java Runtime Environment (JRE)\", \"Wildfly\" sowie \" Apache Xerces2\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-01-11T23:00:00Z", "title": "CVE-2019-12415" }, { "cve": "CVE-2018-1000632", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Dom4J\", \"JDOM\", \"Apache XMLBeans\", \"Apache POI\", \"Sun Java Runtime Environment (JRE)\", \"Wildfly\" sowie \" Apache Xerces2\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-01-11T23:00:00Z", "title": "CVE-2018-1000632" }, { "cve": "CVE-2017-5644", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Dom4J\", \"JDOM\", \"Apache XMLBeans\", \"Apache POI\", \"Sun Java Runtime Environment (JRE)\", \"Wildfly\" sowie \" Apache Xerces2\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-01-11T23:00:00Z", "title": "CVE-2017-5644" }, { "cve": "CVE-2017-12626", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Dom4J\", \"JDOM\", \"Apache XMLBeans\", \"Apache POI\", \"Sun Java Runtime Environment (JRE)\", \"Wildfly\" sowie \" Apache Xerces2\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-01-11T23:00:00Z", "title": "CVE-2017-12626" }, { "cve": "CVE-2013-4002", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Dom4J\", \"JDOM\", \"Apache XMLBeans\", \"Apache POI\", \"Sun Java Runtime Environment (JRE)\", \"Wildfly\" sowie \" Apache Xerces2\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-01-11T23:00:00Z", "title": "CVE-2013-4002" }, { "cve": "CVE-2012-0881", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Dom4J\", \"JDOM\", \"Apache XMLBeans\", \"Apache POI\", \"Sun Java Runtime Environment (JRE)\", \"Wildfly\" sowie \" Apache Xerces2\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-01-11T23:00:00Z", "title": "CVE-2012-0881" }, { "cve": "CVE-2009-2625", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Dom4J\", \"JDOM\", \"Apache XMLBeans\", \"Apache POI\", \"Sun Java Runtime Environment (JRE)\", \"Wildfly\" sowie \" Apache Xerces2\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-01-11T23:00:00Z", "title": "CVE-2009-2625" } ] }
WID-SEC-W-2024-0068
Vulnerability from csaf_certbund
Published
2024-01-11 23:00
Modified
2024-01-17 23:00
Summary
IBM Business Automation Workflow: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM Business Automation Workflow ist eine Lösung zur Automatisierung von Arbeitsabläufen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Business Automation Workflow ausnutzen, um beliebigen Programmcode auszuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen oder Dateien zu manipulieren.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM Business Automation Workflow ist eine L\u00f6sung zur Automatisierung von Arbeitsabl\u00e4ufen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM Business Automation Workflow ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0068 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0068.json" }, { "category": "self", "summary": "WID-SEC-2024-0068 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0068" }, { "category": "external", "summary": "IBM Security Bulletin vom 2024-01-11", "url": "https://www.ibm.com/support/pages/node/7107037" }, { "category": "external", "summary": "IBM Security Bulletin 1288432 vom 2024-01-17", "url": "https://www.ibm.com/support/pages/node/7108718" } ], "source_lang": "en-US", "title": "IBM Business Automation Workflow: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-01-17T23:00:00.000+00:00", "generator": { "date": "2024-02-15T17:56:12.950+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0068", "initial_release_date": "2024-01-11T23:00:00.000+00:00", "revision_history": [ { "date": "2024-01-11T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-01-17T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "2" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM Business Automation Workflow \u003c 23.0.2", "product": { "name": "IBM Business Automation Workflow \u003c 23.0.2", "product_id": "T032025", "product_identification_helper": { "cpe": "cpe:/a:ibm:business_automation_workflow:23.0.2" } } } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-23437", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Dom4J\", \"JDOM\", \"Apache XMLBeans\", \"Apache POI\", \"Sun Java Runtime Environment (JRE)\", \"Wildfly\" sowie \" Apache Xerces2\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-01-11T23:00:00Z", "title": "CVE-2022-23437" }, { "cve": "CVE-2021-33813", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Dom4J\", \"JDOM\", \"Apache XMLBeans\", \"Apache POI\", \"Sun Java Runtime Environment (JRE)\", \"Wildfly\" sowie \" Apache Xerces2\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-01-11T23:00:00Z", "title": "CVE-2021-33813" }, { "cve": "CVE-2021-23926", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Dom4J\", \"JDOM\", \"Apache XMLBeans\", \"Apache POI\", \"Sun Java Runtime Environment (JRE)\", \"Wildfly\" sowie \" Apache Xerces2\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-01-11T23:00:00Z", "title": "CVE-2021-23926" }, { "cve": "CVE-2020-14338", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Dom4J\", \"JDOM\", \"Apache XMLBeans\", \"Apache POI\", \"Sun Java Runtime Environment (JRE)\", \"Wildfly\" sowie \" Apache Xerces2\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-01-11T23:00:00Z", "title": "CVE-2020-14338" }, { "cve": "CVE-2020-10683", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Dom4J\", \"JDOM\", \"Apache XMLBeans\", \"Apache POI\", \"Sun Java Runtime Environment (JRE)\", \"Wildfly\" sowie \" Apache Xerces2\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-01-11T23:00:00Z", "title": "CVE-2020-10683" }, { "cve": "CVE-2019-12415", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Dom4J\", \"JDOM\", \"Apache XMLBeans\", \"Apache POI\", \"Sun Java Runtime Environment (JRE)\", \"Wildfly\" sowie \" Apache Xerces2\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-01-11T23:00:00Z", "title": "CVE-2019-12415" }, { "cve": "CVE-2018-1000632", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Dom4J\", \"JDOM\", \"Apache XMLBeans\", \"Apache POI\", \"Sun Java Runtime Environment (JRE)\", \"Wildfly\" sowie \" Apache Xerces2\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-01-11T23:00:00Z", "title": "CVE-2018-1000632" }, { "cve": "CVE-2017-5644", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Dom4J\", \"JDOM\", \"Apache XMLBeans\", \"Apache POI\", \"Sun Java Runtime Environment (JRE)\", \"Wildfly\" sowie \" Apache Xerces2\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-01-11T23:00:00Z", "title": "CVE-2017-5644" }, { "cve": "CVE-2017-12626", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Dom4J\", \"JDOM\", \"Apache XMLBeans\", \"Apache POI\", \"Sun Java Runtime Environment (JRE)\", \"Wildfly\" sowie \" Apache Xerces2\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-01-11T23:00:00Z", "title": "CVE-2017-12626" }, { "cve": "CVE-2013-4002", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Dom4J\", \"JDOM\", \"Apache XMLBeans\", \"Apache POI\", \"Sun Java Runtime Environment (JRE)\", \"Wildfly\" sowie \" Apache Xerces2\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-01-11T23:00:00Z", "title": "CVE-2013-4002" }, { "cve": "CVE-2012-0881", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Dom4J\", \"JDOM\", \"Apache XMLBeans\", \"Apache POI\", \"Sun Java Runtime Environment (JRE)\", \"Wildfly\" sowie \" Apache Xerces2\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-01-11T23:00:00Z", "title": "CVE-2012-0881" }, { "cve": "CVE-2009-2625", "notes": [ { "category": "description", "text": "In IBM Business Automation Workflow existieren mehrere Schwachstellen. Diese bestehen in den Komponenten \"Dom4J\", \"JDOM\", \"Apache XMLBeans\", \"Apache POI\", \"Sun Java Runtime Environment (JRE)\", \"Wildfly\" sowie \" Apache Xerces2\". Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren oder Dateien zu manipulieren." } ], "release_date": "2024-01-11T23:00:00Z", "title": "CVE-2009-2625" } ] }
wid-sec-w-2022-1738
Vulnerability from csaf_certbund
Published
2022-10-16 22:00
Modified
2023-09-27 22:00
Summary
IBM InfoSphere Information Server: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM InfoSphere Information Server ist eine Softwareplattform zur Integration heterogener Daten.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM InfoSphere Information Server ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM InfoSphere Information Server ist eine Softwareplattform zur Integration heterogener Daten.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM InfoSphere Information Server ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1738 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1738.json" }, { "category": "self", "summary": "WID-SEC-2022-1738 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1738" }, { "category": "external", "summary": "IBM Security Bulletin 7038982 vom 2023-09-28", "url": "https://www.ibm.com/support/pages/node/7038982" }, { "category": "external", "summary": "IBM Security Bulletin: 6829353 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829353" }, { "category": "external", "summary": "IBM Security Bulletin: 6829371 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829371" }, { "category": "external", "summary": "IBM Security Bulletin: 6829373 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829373" }, { "category": "external", "summary": "IBM Security Bulletin: 6829335 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829335" }, { "category": "external", "summary": "IBM Security Bulletin: 6829311 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829311" }, { "category": "external", "summary": "IBM Security Bulletin: 6829369 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829369" }, { "category": "external", "summary": "IBM Security Bulletin: 6829325 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829325" }, { "category": "external", "summary": "IBM Security Bulletin: 6829365 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829365" }, { "category": "external", "summary": "IBM Security Bulletin: 6829361 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829361" }, { "category": "external", "summary": "IBM Security Bulletin: 6829339 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829339" }, { "category": "external", "summary": "IBM Security Bulletin: 6829349 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829349" }, { "category": "external", "summary": "IBM Security Bulletin: 6829363 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829363" }, { "category": "external", "summary": "IBM Security Bulletin: 6829327 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829327" }, { "category": "external", "summary": "IBM Security Bulletin 6955819 vom 2023-02-15", "url": "https://www.ibm.com/support/pages/node/6955819" } ], "source_lang": "en-US", "title": "IBM InfoSphere Information Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-09-27T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:00:50.645+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1738", "initial_release_date": "2022-10-16T22:00:00.000+00:00", "revision_history": [ { "date": "2022-10-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-11-03T23:00:00.000+00:00", "number": "2", "summary": "CVE erg\u00e4nzt" }, { "date": "2023-02-15T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-09-27T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM InfoSphere Information Server 11.7", "product": { "name": "IBM InfoSphere Information Server 11.7", "product_id": "444803", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_information_server:11.7" } } }, { "category": "product_name", "name": "IBM QRadar SIEM", "product": { "name": "IBM QRadar SIEM", "product_id": "T021415", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:-" } } } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0217", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2009-0217" }, { "cve": "CVE-2009-2625", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2009-2625" }, { "cve": "CVE-2012-0881", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2012-0881" }, { "cve": "CVE-2012-2098", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2012-2098" }, { "cve": "CVE-2013-2172", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2013-2172" }, { "cve": "CVE-2013-4002", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2013-4002" }, { "cve": "CVE-2013-4517", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2013-4517" }, { "cve": "CVE-2015-4852", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2015-4852" }, { "cve": "CVE-2015-6420", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2015-6420" }, { "cve": "CVE-2015-7501", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2015-7501" }, { "cve": "CVE-2017-15708", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2017-15708" }, { "cve": "CVE-2019-13116", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2019-13116" }, { "cve": "CVE-2021-33813", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-33813" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-40690", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-40690" }, { "cve": "CVE-2021-41089", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-41089" }, { "cve": "CVE-2021-41091", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-41091" }, { "cve": "CVE-2022-22442", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-22442" }, { "cve": "CVE-2022-23437", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-23437" }, { "cve": "CVE-2022-24769", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-24769" }, { "cve": "CVE-2022-30608", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-30608" }, { "cve": "CVE-2022-30615", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-30615" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-35642", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-35642" }, { "cve": "CVE-2022-35717", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-35717" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-40235", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-40235" }, { "cve": "CVE-2022-40747", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-40747" } ] }
WID-SEC-W-2022-1738
Vulnerability from csaf_certbund
Published
2022-10-16 22:00
Modified
2023-09-27 22:00
Summary
IBM InfoSphere Information Server: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM InfoSphere Information Server ist eine Softwareplattform zur Integration heterogener Daten.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM InfoSphere Information Server ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM InfoSphere Information Server ist eine Softwareplattform zur Integration heterogener Daten.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM InfoSphere Information Server ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1738 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1738.json" }, { "category": "self", "summary": "WID-SEC-2022-1738 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1738" }, { "category": "external", "summary": "IBM Security Bulletin 7038982 vom 2023-09-28", "url": "https://www.ibm.com/support/pages/node/7038982" }, { "category": "external", "summary": "IBM Security Bulletin: 6829353 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829353" }, { "category": "external", "summary": "IBM Security Bulletin: 6829371 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829371" }, { "category": "external", "summary": "IBM Security Bulletin: 6829373 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829373" }, { "category": "external", "summary": "IBM Security Bulletin: 6829335 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829335" }, { "category": "external", "summary": "IBM Security Bulletin: 6829311 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829311" }, { "category": "external", "summary": "IBM Security Bulletin: 6829369 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829369" }, { "category": "external", "summary": "IBM Security Bulletin: 6829325 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829325" }, { "category": "external", "summary": "IBM Security Bulletin: 6829365 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829365" }, { "category": "external", "summary": "IBM Security Bulletin: 6829361 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829361" }, { "category": "external", "summary": "IBM Security Bulletin: 6829339 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829339" }, { "category": "external", "summary": "IBM Security Bulletin: 6829349 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829349" }, { "category": "external", "summary": "IBM Security Bulletin: 6829363 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829363" }, { "category": "external", "summary": "IBM Security Bulletin: 6829327 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829327" }, { "category": "external", "summary": "IBM Security Bulletin 6955819 vom 2023-02-15", "url": "https://www.ibm.com/support/pages/node/6955819" } ], "source_lang": "en-US", "title": "IBM InfoSphere Information Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-09-27T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:00:50.645+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2022-1738", "initial_release_date": "2022-10-16T22:00:00.000+00:00", "revision_history": [ { "date": "2022-10-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-11-03T23:00:00.000+00:00", "number": "2", "summary": "CVE erg\u00e4nzt" }, { "date": "2023-02-15T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-09-27T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM InfoSphere Information Server 11.7", "product": { "name": "IBM InfoSphere Information Server 11.7", "product_id": "444803", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_information_server:11.7" } } }, { "category": "product_name", "name": "IBM QRadar SIEM", "product": { "name": "IBM QRadar SIEM", "product_id": "T021415", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:-" } } } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0217", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2009-0217" }, { "cve": "CVE-2009-2625", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2009-2625" }, { "cve": "CVE-2012-0881", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2012-0881" }, { "cve": "CVE-2012-2098", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2012-2098" }, { "cve": "CVE-2013-2172", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2013-2172" }, { "cve": "CVE-2013-4002", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2013-4002" }, { "cve": "CVE-2013-4517", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2013-4517" }, { "cve": "CVE-2015-4852", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2015-4852" }, { "cve": "CVE-2015-6420", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2015-6420" }, { "cve": "CVE-2015-7501", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2015-7501" }, { "cve": "CVE-2017-15708", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2017-15708" }, { "cve": "CVE-2019-13116", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2019-13116" }, { "cve": "CVE-2021-33813", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-33813" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-40690", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-40690" }, { "cve": "CVE-2021-41089", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-41089" }, { "cve": "CVE-2021-41091", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2021-41091" }, { "cve": "CVE-2022-22442", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-22442" }, { "cve": "CVE-2022-23437", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-23437" }, { "cve": "CVE-2022-24769", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-24769" }, { "cve": "CVE-2022-30608", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-30608" }, { "cve": "CVE-2022-30615", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-30615" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-35642", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-35642" }, { "cve": "CVE-2022-35717", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-35717" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-40235", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-40235" }, { "cve": "CVE-2022-40747", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00Z", "title": "CVE-2022-40747" } ] }
gsd-2009-2625
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2009-2625", "description": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.", "id": "GSD-2009-2625", "references": [ "https://www.suse.com/security/cve/CVE-2009-2625.html", "https://www.debian.org/security/2010/dsa-1984", "https://www.debian.org/security/2009/dsa-1921", "https://access.redhat.com/errata/RHSA-2013:0763", "https://access.redhat.com/errata/RHSA-2012:1537", "https://access.redhat.com/errata/RHSA-2012:1232", "https://access.redhat.com/errata/RHSA-2012:0725", "https://access.redhat.com/errata/RHSA-2011:0858", "https://access.redhat.com/errata/RHSA-2010:0043", "https://access.redhat.com/errata/RHSA-2009:1662", "https://access.redhat.com/errata/RHSA-2009:1650", "https://access.redhat.com/errata/RHSA-2009:1649", "https://access.redhat.com/errata/RHSA-2009:1637", "https://access.redhat.com/errata/RHSA-2009:1636", "https://access.redhat.com/errata/RHSA-2009:1615", "https://access.redhat.com/errata/RHSA-2009:1582", "https://access.redhat.com/errata/RHSA-2009:1551", "https://access.redhat.com/errata/RHSA-2009:1505", "https://access.redhat.com/errata/RHSA-2009:1236", "https://access.redhat.com/errata/RHSA-2009:1201", "https://access.redhat.com/errata/RHSA-2009:1200", "https://access.redhat.com/errata/RHSA-2009:1199", "https://linux.oracle.com/cve/CVE-2009-2625.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2009-2625" ], "details": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.", "id": "GSD-2009-2625", "modified": "2023-12-13T01:19:46.469567Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2009-2625", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "SSA:2011-041-02", "refsource": "SLACKWARE", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.486026" }, { "name": "RHSA-2009:1200", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" }, { "name": "RHSA-2009:1199", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html" }, { "name": "http://www.networkworld.com/columnists/2009/080509-xml-flaw.html", "refsource": "MISC", "url": "http://www.networkworld.com/columnists/2009/080509-xml-flaw.html" }, { "name": "USN-890-1", "refsource": "UBUNTU", "url": "http://www.ubuntu.com/usn/USN-890-1" }, { "name": "36162", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36162" }, { "name": "ADV-2009-2543", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "name": "DSA-1984", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2010/dsa-1984" }, { "name": "[oss-security] 20091022 Re: Regarding expat bug 1990430", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/10/22/9" }, { "name": "1021506", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1" }, { "name": "37460", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37460" }, { "name": "RHSA-2009:1615", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2009-1615.html" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "HPSBUX02476", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2" }, { "name": "37754", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37754" }, { "name": "RHSA-2009:1637", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2009-1637.html" }, { "name": "http://www.cert.fi/en/reports/2009/vulnerability2009085.html", "refsource": "MISC", "url": "http://www.cert.fi/en/reports/2009/vulnerability2009085.html" }, { "name": "http://www.codenomicon.com/labs/xml/", "refsource": "MISC", "url": "http://www.codenomicon.com/labs/xml/" }, { "name": "36199", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36199" }, { "name": "RHSA-2012:1537", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-1537.html" }, { "name": "SUSE-SR:2010:013", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" }, { "name": "MDVSA-2009:209", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" }, { "name": "FEDORA-2009-8329", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" }, { "name": "RHSA-2011:0858", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0858.html" }, { "name": "SSRT090250", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2" }, { "name": "1022680", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1022680" }, { "name": "37671", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37671" }, { "name": "38342", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38342" }, { "name": "RHSA-2009:1636", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2009-1636.html" }, { "name": "35958", "refsource": "BID", "url": "http://www.securityfocus.com/bid/35958" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "RHSA-2009:1649", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2009-1649.html" }, { "name": "[oss-security] 20091026 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/10/26/3" }, { "name": "TA09-294A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html" }, { "name": "50549", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/50549" }, { "name": "oval:org.mitre.oval:def:8520", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520" }, { "name": "36180", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36180" }, { "name": "38231", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/38231" }, { "name": "272209", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1" }, { "name": "MDVSA-2011:108", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:108" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1", "refsource": "CONFIRM", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1" }, { "name": "36176", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/36176" }, { "name": "FEDORA-2009-8337", "refsource": "FEDORA", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" }, { "name": "43300", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43300" }, { "name": "oval:org.mitre.oval:def:9356", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356" }, { "name": "TA10-012A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA10-012A.html" }, { "name": "SUSE-SR:2009:016", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "name": "RHSA-2012:1232", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2012-1232.html" }, { "name": "263489", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1" }, { "name": "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055\u0026r2=787352\u0026pathrev=787353\u0026diff_format=h", "refsource": "CONFIRM", "url": "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055\u0026r2=787352\u0026pathrev=787353\u0026diff_format=h" }, { "name": "37300", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/37300" }, { "name": "APPLE-SA-2009-09-03-1", "refsource": "APPLE", "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "name": "SUSE-SA:2009:053", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=512921", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "name": "RHSA-2009:1201", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html" }, { "name": "SUSE-SR:2009:017", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" }, { "name": "[oss-security] 20090906 Re: Re: expat bug 1990430", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/09/06/1" }, { "name": "[oss-security] 20091023 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2009/10/23/6" }, { "name": "ADV-2011-0359", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0359" }, { "name": "ADV-2009-3316", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "name": "RHSA-2009:1650", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2009-1650.html" }, { "name": "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1", "refsource": "MLIST", "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "(,2.9.1]", "affected_versions": "All versions up to 2.9.1", "cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "cwe_ids": [ "CWE-1035", "CWE-264", "CWE-937" ], "date": "2018-10-10", "description": "`XMLScanner.java` allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input.", "fixed_versions": [ "2.10.0" ], "identifier": "CVE-2009-2625", "identifiers": [ "CVE-2009-2625" ], "not_impacted": "All versions after 2.9.1", "package_slug": "maven/xerces/xercesImpl", "pubdate": "2009-08-06", "solution": "Upgrade to version 2.10.0 or above.", "title": "Uncontrolled Resource Consumption", "urls": [ "https://bugzilla.redhat.com/CVE-2009-2625" ], "uuid": "e9d63431-e9b6-44cd-b3f8-f0c7d8aa049b" } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update17:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update18:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update19:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.5.0:update4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:jdk:1.6.0:update7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:opensuse:opensuse:11.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:10:sp2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:-:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:9.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:9.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:8.04:*:*:*:-:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:canonical:ubuntu_linux:6.06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:oracle:primavera_web_services:7.0:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:primavera_web_services:7.0:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:primavera_web_services:6.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:6.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:oracle:primavera_p6_enterprise_project_portfolio_management:6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:apache:xerces2_java:2.9.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2009-2625" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.networkworld.com/columnists/2009/080509-xml-flaw.html", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "http://www.networkworld.com/columnists/2009/080509-xml-flaw.html" }, { "name": "263489", "refsource": "SUNALERT", "tags": [ "Broken Link", "Patch", "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1" }, { "name": "http://www.codenomicon.com/labs/xml/", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "http://www.codenomicon.com/labs/xml/" }, { "name": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1", "refsource": "CONFIRM", "tags": [ "Broken Link", "Patch" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1" }, { "name": "http://www.cert.fi/en/reports/2009/vulnerability2009085.html", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "http://www.cert.fi/en/reports/2009/vulnerability2009085.html" }, { "name": "RHSA-2009:1200", "refsource": "REDHAT", "tags": [ "Broken Link" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" }, { "name": "RHSA-2009:1201", "refsource": "REDHAT", "tags": [ "Broken Link" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html" }, { "name": "1022680", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id?1022680" }, { "name": "36176", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/36176" }, { "name": "FEDORA-2009-8337", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" }, { "name": "36180", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/36180" }, { "name": "36162", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/36162" }, { "name": "RHSA-2009:1199", "refsource": "REDHAT", "tags": [ "Broken Link" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html" }, { "name": "FEDORA-2009-8329", "refsource": "FEDORA", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" }, { "name": "36199", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/36199" }, { "name": "35958", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/35958" }, { "name": "MDVSA-2009:209", "refsource": "MANDRIVA", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" }, { "name": "APPLE-SA-2009-09-03-1", "refsource": "APPLE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "name": "ADV-2009-2543", "refsource": "VUPEN", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "name": "TA09-294A", "refsource": "CERT", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html" }, { "name": "SUSE-SR:2009:016", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "name": "[oss-security] 20090906 Re: Re: expat bug 1990430", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2009/09/06/1" }, { "name": "[oss-security] 20091022 Re: Regarding expat bug 1990430", "refsource": "MLIST", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2009/10/22/9" }, { "name": "[oss-security] 20091023 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2009/10/23/6" }, { "name": "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055\u0026r2=787352\u0026pathrev=787353\u0026diff_format=h", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055\u0026r2=787352\u0026pathrev=787353\u0026diff_format=h" }, { "name": "[oss-security] 20091026 Re: CVE Request -- expat [was: Re: Regarding expat bug 1990430]", "refsource": "MLIST", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2009/10/26/3" }, { "name": "SUSE-SA:2009:053", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html" }, { "name": "37300", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/37300" }, { "name": "HPSBUX02476", "refsource": "HP", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2" }, { "name": "272209", "refsource": "SUNALERT", "tags": [ "Broken Link" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1" }, { "name": "37671", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/37671" }, { "name": "37754", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/37754" }, { "name": "ADV-2009-3316", "refsource": "VUPEN", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "name": "RHSA-2009:1650", "refsource": "REDHAT", "tags": [ "Broken Link" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1650.html" }, { "name": "RHSA-2009:1615", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2009-1615.html" }, { "name": "RHSA-2009:1636", "refsource": "REDHAT", "tags": [ "Broken Link" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1636.html" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "name": "RHSA-2009:1637", "refsource": "REDHAT", "tags": [ "Broken Link" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1637.html" }, { "name": "37460", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/37460" }, { "name": "SUSE-SR:2009:017", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" }, { "name": "RHSA-2009:1649", "refsource": "REDHAT", "tags": [ "Broken Link" ], "url": "https://rhn.redhat.com/errata/RHSA-2009-1649.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=512921", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "name": "TA10-012A", "refsource": "CERT", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-012A.html" }, { "name": "DSA-1984", "refsource": "DEBIAN", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2010/dsa-1984" }, { "name": "38342", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/38342" }, { "name": "38231", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/38231" }, { "name": "USN-890-1", "refsource": "UBUNTU", "tags": [ "Third Party Advisory" ], "url": "http://www.ubuntu.com/usn/USN-890-1" }, { "name": "1021506", "refsource": "SUNALERT", "tags": [ "Broken Link" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1" }, { "name": "SUSE-SR:2010:013", "refsource": "SUSE", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" }, { "name": "43300", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/43300" }, { "name": "ADV-2011-0359", "refsource": "VUPEN", "tags": [ "Permissions Required" ], "url": "http://www.vupen.com/english/advisories/2011/0359" }, { "name": "SSA:2011-041-02", "refsource": "SLACKWARE", "tags": [ "Third Party Advisory" ], "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.486026" }, { "name": "MDVSA-2011:108", "refsource": "MANDRIVA", "tags": [ "Third Party Advisory" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:108" }, { "name": "RHSA-2011:0858", "refsource": "REDHAT", "tags": [ "Third Party Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0858.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html", "refsource": "CONFIRM", "tags": [ "Broken Link" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html" }, { "name": "50549", "refsource": "SECUNIA", "tags": [ "Third Party Advisory" ], "url": "http://secunia.com/advisories/50549" }, { "name": "RHSA-2012:1232", "refsource": "REDHAT", "tags": [ "Broken Link" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1232.html" }, { "name": "RHSA-2012:1537", "refsource": "REDHAT", "tags": [ "Broken Link" ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1537.html" }, { "name": "oval:org.mitre.oval:def:9356", "refsource": "OVAL", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356" }, { "name": "oval:org.mitre.oval:def:8520", "refsource": "OVAL", "tags": [ "Third Party Advisory" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520" }, { "name": "20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components", "refsource": "BUGTRAQ", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "name": "[lucene-solr-user] 20200320 CVEs (vulnerabilities) that apply to Solr 8.4.1", "refsource": "MLIST", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2022-05-13T14:44Z", "publishedDate": "2009-08-06T15:30Z" } } }
ghsa-334p-wv2m-w3vp
Vulnerability from github
Published
2020-06-15 18:51
Modified
2020-06-15 15:55
Summary
Denial of service in Apache Xerces2
Details
XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "xerces:xercesImpl" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "2.10.0" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2009-2625" ], "database_specific": { "cwe_ids": [], "github_reviewed": true, "github_reviewed_at": "2020-06-15T15:55:30Z", "nvd_published_at": "2009-08-06T15:30:00Z", "severity": "MODERATE" }, "details": "XMLScanner.java in Apache Xerces2 Java, as used in Sun Java Runtime Environment (JRE) in JDK and JRE 6 before Update 15 and JDK and JRE 5.0 before Update 20, and in other products, allows remote attackers to cause a denial of service (infinite loop and application hang) via malformed XML input, as demonstrated by the Codenomicon XML fuzzing framework.", "id": "GHSA-334p-wv2m-w3vp", "modified": "2020-06-15T15:55:30Z", "published": "2020-06-15T18:51:30Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-2625" }, { "type": "WEB", "url": "https://github.com/apache/xerces2-j/commit/0bdf77af1d4fd26ec2e630fb6d12e2dfa77bc12b" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=512921" }, { "type": "WEB", "url": "https://lists.apache.org/thread.html/r204ba2a9ea750f38d789d2bb429cc0925ad6133deea7cbc3001d96b5@%3Csolr-user.lucene.apache.org%3E" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8520" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9356" }, { "type": "WEB", "url": "https://rhn.redhat.com/errata/RHSA-2009-1199.html" }, { "type": "WEB", "url": "https://rhn.redhat.com/errata/RHSA-2009-1200.html" }, { "type": "WEB", "url": "https://rhn.redhat.com/errata/RHSA-2009-1201.html" }, { "type": "WEB", "url": "https://rhn.redhat.com/errata/RHSA-2009-1636.html" }, { "type": "WEB", "url": "https://rhn.redhat.com/errata/RHSA-2009-1637.html" }, { "type": "WEB", "url": "https://rhn.redhat.com/errata/RHSA-2009-1649.html" }, { "type": "WEB", "url": "https://rhn.redhat.com/errata/RHSA-2009-1650.html" }, { "type": "WEB", "url": "https://snyk.io/vuln/SNYK-JAVA-XERCES-32014" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00310.html" }, { "type": "WEB", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-August/msg00325.html" }, { "type": "WEB", "url": "http://lists.apple.com/archives/security-announce/2009/Sep/msg00000.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00004.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-11/msg00002.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-06/msg00001.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=125787273209737\u0026w=2" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-1232.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2012-1537.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/36162" }, { "type": "WEB", "url": "http://secunia.com/advisories/36176" }, { "type": "WEB", "url": "http://secunia.com/advisories/36180" }, { "type": "WEB", "url": "http://secunia.com/advisories/36199" }, { "type": "WEB", "url": "http://secunia.com/advisories/37300" }, { "type": "WEB", "url": "http://secunia.com/advisories/37460" }, { "type": "WEB", "url": "http://secunia.com/advisories/37671" }, { "type": "WEB", "url": "http://secunia.com/advisories/37754" }, { "type": "WEB", "url": "http://secunia.com/advisories/38231" }, { "type": "WEB", "url": "http://secunia.com/advisories/38342" }, { "type": "WEB", "url": "http://secunia.com/advisories/43300" }, { "type": "WEB", "url": "http://secunia.com/advisories/50549" }, { "type": "WEB", "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2011\u0026m=slackware-security.486026" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-21-125136-16-1" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-263489-1" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-272209-1" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021506.1-1" }, { "type": "WEB", "url": "http://svn.apache.org/viewvc/xerces/java/trunk/src/org/apache/xerces/impl/XMLScanner.java?r1=572055\u0026r2=787352\u0026pathrev=787353\u0026diff_format=h" }, { "type": "WEB", "url": "http://www.cert.fi/en/reports/2009/vulnerability2009085.html" }, { "type": "WEB", "url": "http://www.codenomicon.com/labs/xml" }, { "type": "WEB", "url": "http://www.debian.org/security/2010/dsa-1984" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:209" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:108" }, { "type": "WEB", "url": "http://www.networkworld.com/columnists/2009/080509-xml-flaw.html" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2009/09/06/1" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2009/10/22/9" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2009/10/23/6" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2009/10/26/3" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/cpujan2010-084891.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/cpuoct2009-096303.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2009-1615.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0858.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/507985/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/35958" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1022680" }, { "type": "WEB", "url": "http://www.ubuntu.com/usn/USN-890-1" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA09-294A.html" }, { "type": "WEB", "url": "http://www.us-cert.gov/cas/techalerts/TA10-012A.html" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2009-0016.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/2543" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2009/3316" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0359" } ], "schema_version": "1.4.0", "severity": [], "summary": "Denial of service in Apache Xerces2" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.