Action not permitted
Modal body text goes here.
cve-2010-4476
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:43:14.943Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "43295", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43295" }, { "name": "1025062", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025062" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html" }, { "name": "43280", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43280" }, { "name": "RHSA-2011:0210", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0210.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html" }, { "name": "GLSA-201406-32", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "oval:org.mitre.oval:def:14328", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14328" }, { "name": "HPSBMU02799", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "name": "FEDORA-2011-1231", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053926.html" }, { "name": "FEDORA-2011-1263", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053934.html" }, { "name": "SUSE-SU-2011:0823", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html" }, { "name": "HPSBNS02633", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" }, { "name": "SSRT100387", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "name": "HPSBUX02860", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "name": "RHSA-2011:0214", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0214.html" }, { "name": "PM31983", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM31983" }, { "name": "45555", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45555" }, { "name": "IZ94423", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ94423" }, { "name": "43400", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43400" }, { "name": "SSRT100412", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "name": "HPSBMA02642", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "name": "43378", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43378" }, { "name": "45022", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45022" }, { "name": "RHSA-2011:0333", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0333.html" }, { "name": "ADV-2011-0422", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0422" }, { "name": "oval:org.mitre.oval:def:12662", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12662" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html" }, { "name": "HPSBMU02690", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "name": "ADV-2011-0434", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0434" }, { "name": "HPSBUX02633", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "name": "HPSBOV02762", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "name": "oval:org.mitre.oval:def:14589", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14589" }, { "name": "HPSBUX02641", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "name": "RHSA-2011:0213", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0213.html" }, { "name": "SSRT100627", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/" }, { "name": "ADV-2011-0377", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0377" }, { "name": "44954", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44954" }, { "name": "HPSBOV02634", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=130497132406206\u0026w=2" }, { "name": "ADV-2011-0365", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0365" }, { "name": "SSRT100415", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html" }, { "name": "RHSA-2011:0880", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html" }, { "name": "oval:org.mitre.oval:def:12745", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12745" }, { "name": "RHSA-2011:0334", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0334.html" }, { "name": "RHSA-2011:0282", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0282.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468358" }, { "name": "43048", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43048" }, { "name": "DSA-2161", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2161" }, { "name": "SSRT100825", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "name": "ADV-2011-0379", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0379" }, { "name": "43304", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43304" }, { "name": "RHSA-2011:0211", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0211.html" }, { "name": "SSRT100390", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" }, { "name": "SSRT100867", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "name": "49198", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49198" }, { "name": "43659", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43659" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg24029498" }, { "name": "HPSBUX02725", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "name": "SUSE-SA:2011:024", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html" }, { "name": "HPSBUX02777", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "oval:org.mitre.oval:def:19493", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19493" }, { "name": "43333", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43333" }, { "name": "SSRT101146", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "name": "SSRT100569", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "name": "HPSBUX02645", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=130168502603566\u0026w=2" }, { "name": "RHSA-2011:0212", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0212.html" }, { "name": "HPSBUX02642", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=130270785502599\u0026w=2" }, { "name": "SSRT100854", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html" }, { "name": "ADV-2011-0605", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0605" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blog.fortify.com/blog/2011/02/08/Double-Trouble" }, { "name": "HPSBTU02684", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=130497185606818\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg24029497" }, { "name": "MDVSA-2011:054", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:054" }, { "name": "HPSBMU02797", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-21T18:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "43295", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43295" }, { "name": "1025062", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025062" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html" }, { "name": "43280", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43280" }, { "name": "RHSA-2011:0210", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0210.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html" }, { "name": "GLSA-201406-32", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "oval:org.mitre.oval:def:14328", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14328" }, { "name": "HPSBMU02799", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "name": "FEDORA-2011-1231", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053926.html" }, { "name": "FEDORA-2011-1263", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053934.html" }, { "name": "SUSE-SU-2011:0823", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html" }, { "name": "HPSBNS02633", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" }, { "name": "SSRT100387", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "name": "HPSBUX02860", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "name": "RHSA-2011:0214", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0214.html" }, { "name": "PM31983", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM31983" }, { "name": "45555", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45555" }, { "name": "IZ94423", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ94423" }, { "name": "43400", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43400" }, { "name": "SSRT100412", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "name": "HPSBMA02642", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "name": "43378", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43378" }, { "name": "45022", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45022" }, { "name": "RHSA-2011:0333", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0333.html" }, { "name": "ADV-2011-0422", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0422" }, { "name": "oval:org.mitre.oval:def:12662", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12662" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html" }, { "name": "HPSBMU02690", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "name": "ADV-2011-0434", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0434" }, { "name": "HPSBUX02633", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "name": "HPSBOV02762", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "name": "oval:org.mitre.oval:def:14589", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14589" }, { "name": "HPSBUX02641", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "name": "RHSA-2011:0213", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0213.html" }, { "name": "SSRT100627", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/" }, { "name": "ADV-2011-0377", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0377" }, { "name": "44954", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44954" }, { "name": "HPSBOV02634", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=130497132406206\u0026w=2" }, { "name": "ADV-2011-0365", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0365" }, { "name": "SSRT100415", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html" }, { "name": "RHSA-2011:0880", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html" }, { "name": "oval:org.mitre.oval:def:12745", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12745" }, { "name": "RHSA-2011:0334", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0334.html" }, { "name": "RHSA-2011:0282", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0282.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468358" }, { "name": "43048", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43048" }, { "name": "DSA-2161", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2161" }, { "name": "SSRT100825", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "name": "ADV-2011-0379", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0379" }, { "name": "43304", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43304" }, { "name": "RHSA-2011:0211", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0211.html" }, { "name": "SSRT100390", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" }, { "name": "SSRT100867", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "name": "49198", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49198" }, { "name": "43659", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43659" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg24029498" }, { "name": "HPSBUX02725", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "name": "SUSE-SA:2011:024", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html" }, { "name": "HPSBUX02777", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "oval:org.mitre.oval:def:19493", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19493" }, { "name": "43333", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43333" }, { "name": "SSRT101146", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "name": "SSRT100569", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "name": "HPSBUX02645", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=130168502603566\u0026w=2" }, { "name": "RHSA-2011:0212", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0212.html" }, { "name": "HPSBUX02642", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=130270785502599\u0026w=2" }, { "name": "SSRT100854", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html" }, { "name": "ADV-2011-0605", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0605" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blog.fortify.com/blog/2011/02/08/Double-Trouble" }, { "name": "HPSBTU02684", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=130497185606818\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg24029497" }, { "name": "MDVSA-2011:054", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:054" }, { "name": "HPSBMU02797", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2010-4476", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "43295", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43295" }, { "name": "1025062", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025062" }, { "name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html", "refsource": "CONFIRM", "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html" }, { "name": "43280", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43280" }, { "name": "RHSA-2011:0210", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0210.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html" }, { "name": "GLSA-201406-32", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "oval:org.mitre.oval:def:14328", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14328" }, { "name": "HPSBMU02799", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "name": "FEDORA-2011-1231", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053926.html" }, { "name": "FEDORA-2011-1263", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053934.html" }, { "name": "SUSE-SU-2011:0823", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html" }, { "name": "HPSBNS02633", "refsource": "HP", "url": "http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" }, { "name": "SSRT100387", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "name": "HPSBUX02860", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "name": "RHSA-2011:0214", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0214.html" }, { "name": "PM31983", "refsource": "AIXAPAR", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM31983" }, { "name": "45555", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/45555" }, { "name": "IZ94423", "refsource": "AIXAPAR", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ94423" }, { "name": "43400", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43400" }, { "name": "SSRT100412", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "name": "HPSBMA02642", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "name": "43378", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43378" }, { "name": "45022", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/45022" }, { "name": "RHSA-2011:0333", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0333.html" }, { "name": "ADV-2011-0422", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0422" }, { "name": "oval:org.mitre.oval:def:12662", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12662" }, { "name": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html" }, { "name": "HPSBMU02690", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "name": "ADV-2011-0434", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0434" }, { "name": "HPSBUX02633", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "name": "HPSBOV02762", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "name": "oval:org.mitre.oval:def:14589", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14589" }, { "name": "HPSBUX02641", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "name": "RHSA-2011:0213", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0213.html" }, { "name": "SSRT100627", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "name": "http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/", "refsource": "MISC", "url": "http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/" }, { "name": "ADV-2011-0377", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0377" }, { "name": "44954", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44954" }, { "name": "HPSBOV02634", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130497132406206\u0026w=2" }, { "name": "ADV-2011-0365", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0365" }, { "name": "SSRT100415", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "name": "http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html", "refsource": "CONFIRM", "url": "http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html" }, { "name": "RHSA-2011:0880", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html" }, { "name": "oval:org.mitre.oval:def:12745", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12745" }, { "name": "RHSA-2011:0334", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0334.html" }, { "name": "RHSA-2011:0282", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0282.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21468358", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468358" }, { "name": "43048", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43048" }, { "name": "DSA-2161", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2161" }, { "name": "SSRT100825", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "name": "ADV-2011-0379", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0379" }, { "name": "43304", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43304" }, { "name": "RHSA-2011:0211", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0211.html" }, { "name": "SSRT100390", "refsource": "HP", "url": "http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" }, { "name": "SSRT100867", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "name": "49198", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49198" }, { "name": "43659", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43659" }, { "name": "http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg24029498", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg24029498" }, { "name": "HPSBUX02725", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "name": "SUSE-SA:2011:024", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html" }, { "name": "HPSBUX02777", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "oval:org.mitre.oval:def:19493", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19493" }, { "name": "43333", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43333" }, { "name": "SSRT101146", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "name": "SSRT100569", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "name": "HPSBUX02645", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130168502603566\u0026w=2" }, { "name": "RHSA-2011:0212", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0212.html" }, { "name": "HPSBUX02642", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130270785502599\u0026w=2" }, { "name": "SSRT100854", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html", "refsource": "CONFIRM", "url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html" }, { "name": "ADV-2011-0605", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0605" }, { "name": "http://blog.fortify.com/blog/2011/02/08/Double-Trouble", "refsource": "MISC", "url": "http://blog.fortify.com/blog/2011/02/08/Double-Trouble" }, { "name": "HPSBTU02684", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130497185606818\u0026w=2" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg24029497", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg24029497" }, { "name": "MDVSA-2011:054", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:054" }, { "name": "HPSBMU02797", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2010-4476", "datePublished": "2011-02-17T18:31:00", "dateReserved": "2010-12-06T00:00:00", "dateUpdated": "2024-08-07T03:43:14.943Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2010-4476\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2011-02-17T19:00:01.900\",\"lastModified\":\"2018-10-30T16:26:21.390\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.\"},{\"lang\":\"es\",\"value\":\"El m\u00e9todo Double.parseDouble en Java Runtime Environment (JRE) en Oracle Java SE y Java para Business 6 Update 23 y versiones anteriores, 5.0 Update 27 y versiones anteriores y 1.4.2_29 y versiones anteriores, tal como se utiliza en OpenJDK, Apache, JBossweb y otros productos , permite a atacantes remotos provocar una denegaci\u00f3n de servicio a trav\u00e9s de una cadena manipulada que desencadena un bucle infinito de estimaciones durante la conversi\u00f3n a un n\u00famero de coma flotante binario de doble precisi\u00f3n, como se demuestra usando 2.2250738585072012e-308.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\",\"baseScore\":5.0},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:*:update_23:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.6.0\",\"matchCriteriaId\":\"0863352B-4389-466F-9240-90944DB1B932\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBCD143C-057D-4F42-B487-46801E14ACF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"09027C19-D442-446F-B7A8-21DB6787CF43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A0FEC28-0707-4F42-9740-78F3D2D551EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3C5879A-A608-4230-9DC1-C27F0F48A13B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A3B254-8580-45DB-BDE4-5B5A29CBFFB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*\",\"matchCriteriaId\":\"AADBB4F9-E43E-428B-9979-F47A15696C85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*\",\"matchCriteriaId\":\"49260B94-05DE-4B78-9068-6F5F6BFDD19E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4FDE9EB-08FE-436E-A265-30E83B15DB23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE409D5C-8F9F-4DE9-ACB7-0E0B813F6399\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7158D2C0-E9AC-4CD6-B777-EA7B7A181997\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*\",\"matchCriteriaId\":\"B08C075B-9FC0-4381-A9E4-FFF0362BD308\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*\",\"matchCriteriaId\":\"F587E635-3A15-4186-B6A1-F99BE0A56820\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_22:*:*:*:*:*:*\",\"matchCriteriaId\":\"188D2242-7D16-4F8E-AB61-4663804AAC17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"90EC6C13-4B37-48E5-8199-A702A944D5A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"2528152C-E20A-4D97-931C-A5EC3CEAA06D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"A99DAB4C-272B-4C91-BC70-7729E1152590\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"30DFC10A-A4D9-4F89-B17C-AB9260087D29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"272A5C44-18EC-41A9-8233-E9D4D0734EA6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:*:update_23:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.6.0\",\"matchCriteriaId\":\"F647BC01-31B7-4FF9-B77B-FD4F5B3E708D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3A4FEC7-A4A0-4B5C-A56C-8F80AE19865E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"722A93D8-B5BC-42F3-92A2-E424F61269A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*\",\"matchCriteriaId\":\"775F2611-F11C-4B84-8F40-0D034B81BF18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*\",\"matchCriteriaId\":\"F20FDD9F-FF45-48BC-9207-54FB02E76071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FA326F5-894A-4B01-BCA3-B126DA81CA59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*\",\"matchCriteriaId\":\"228AB7B4-4BA4-43D4-B562-D438884DB152\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFD5C688-2103-4D60-979E-D9BE69A989C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*\",\"matchCriteriaId\":\"21421215-F722-4207-A2E5-E2DF4B29859B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFB9EA23-0EF7-4582-A265-3F5AA9EC81B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*\",\"matchCriteriaId\":\"C367B418-659E-4627-B1F1-1B1216C99055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD5E6D4E-DDDD-4B45-B5E9-F8A916287AF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*\",\"matchCriteriaId\":\"7358492A-491C-491E-AEDF-63CB82619BAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3DACAAF-AFDC-4391-9E85-344F30937F76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_22:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECEDE405-CEF6-4E52-A8AE-28B9274B2289\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D98175BF-B084-4FA5-899D-9E80DC3923EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"820632CE-F8DF-47EE-B716-7530E60008B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA2BD0A3-7B2D-447B-ABAC-7B867B03B632\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"D54AB785-E9B7-47BD-B756-0C3A629D67DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9412098-0353-4F7B-9245-010557E6C651\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD30DAEB-4893-41CF-A455-B69C463B9337\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*\",\"matchCriteriaId\":\"21D6CE7E-A036-496C-8E08-A87F62B5290A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8F93BBE-1E8C-4EB3-BCC7-20AB2D813F98\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:*:update27:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.5.0\",\"matchCriteriaId\":\"B32A75D7-8038-413A-BDB8-43C9A6DE33F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A02CF738-1B4F-44D0-A618-3D3E4EF1C9B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE8E883F-E13D-4FB0-8C6F-B7628600E8D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AADA633-EB11-49A0-8E40-66589034F03E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*\",\"matchCriteriaId\":\"19DC29C5-1B9F-46DF-ACF6-3FF93E45777D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*\",\"matchCriteriaId\":\"B120F7D9-7C1E-4716-B2FA-2990D449F754\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD61E49F-2A46-4107-BB3F-527079983306\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*\",\"matchCriteriaId\":\"D900AAE0-6032-4096-AFC2-3D43C55C6C83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*\",\"matchCriteriaId\":\"88B0958C-744C-4946-908C-09D2A5FAB120\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3E7F3CA-FFB3-42B3-A64F-0E38FAF252FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A2D8D09-3F18-4E73-81CF-BB589BB8AEC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FD24779-988F-4EC1-AC19-77186B68229E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F1E860E-98F2-48FF-B8B3-54D4B58BF81F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"28BE548B-DD0C-4C58-98CA-5B803F04F9EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*\",\"matchCriteriaId\":\"505A8F40-7758-412F-8895-FA1B00BE6B7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*\",\"matchCriteriaId\":\"212F4A5F-87E3-4C62-BA21-46CBBCD8D26A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C4DFCD2-00A3-4BC7-8842-836CE22C7B39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB3A0C49-3FF9-4CB7-9E01-F771D4925103\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7D1BBD4-2F88-4372-B863-BB70753D841B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update25:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A75A4C0-6B49-424B-BEC0-0E0AAEF877B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update26:*:*:*:*:*:*\",\"matchCriteriaId\":\"03555D1A-9470-4227-B843-E6EF91A6BC55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F8E9AA0-8907-4B1A-86A1-08568195217D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A337AD31-4566-4A4E-AFF3-7EAECD5C90F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*\",\"matchCriteriaId\":\"0754AFDC-2F1C-4C06-AB46-457B5E610029\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*\",\"matchCriteriaId\":\"532CF9DD-0EBB-4B3B-BB9C-A8D78947A790\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC0ABF7A-107B-4B97-9BD7-7B0CEDAAF359\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5DA4242-30D9-44C8-9D0D-877348FFA22B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*\",\"matchCriteriaId\":\"C61C6043-99D0-4F36-AF84-1A5F90B895EE\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.4.2_29\",\"matchCriteriaId\":\"6186321E-5B05-49B5-9200-EA6B5CC3653B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"002CA86D-3090-4C7A-947A-21CB5D1ADD98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F6453C9-7EE0-4FFB-861D-C2D9416DCABA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF4E34FD-D927-42BB-8A16-031D77CB4B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DDE253E-C8B6-4C1D-AECE-ABEA1A67306B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A56D9A60-F272-4D4C-A9DD-C93DAF783585\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF109CAA-E8D2-4BD7-BE7C-AF8B2A78672E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"976F4ACB-3725-45B7-B2EF-DEE4B88254E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52BDD6A8-1611-4C3C-865D-6EDB5B9F8D88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A1F28FF-652A-4C89-9AC6-5E212F890811\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96A8C351-E9CD-431B-8B9D-712CA54C7213\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36888382-79C8-4C97-A654-C668CD68556F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F34C99E6-F9F0-4EF3-8601-B47EAE3D7273\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A74DD08D-CEDB-460E-BED5-78F6CAF18BF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E60560EC-6DBD-4A17-BFFA-FAD9193A0BC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4F64FBC-DC97-4FE3-A235-18B87945AF7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85048406-9051-4E69-94A8-5C449F3B89E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1C88DD7-0B46-4405-BD35-60D27E2DBA14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08D23B7C-7B8C-41B8-8D94-BB0F27C7F0A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C49B997-95D3-4DA4-A353-DB41AD461C5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F70EF76-ED5F-4835-8252-FE613604FA3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BDBCAD8-CDF7-4550-8EA2-1409B02FFAD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E691333-0434-4808-9ED4-E82C6EC2FD37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBE7A538-FF2E-4622-8479-781AB73CBA45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD491CD3-5763-4698-8893-2D5F5609BD89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADF4E465-6B0B-4295-81F7-D09ADB81394C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E79C04F7-E3A1-4DF5-94E9-E96A6FC61FC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5743F0FD-486D-4787-B53E-CCD220BBCDF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39847B3A-6DF5-4CED-B89C-18513395B540\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"649AD6BA-D8CF-4C19-A540-E2266945015F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:*:update27:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.5.0\",\"matchCriteriaId\":\"4A7E109E-D17D-4396-B1F3-8D9E059BCFFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"133A7B66-E0B3-4867-A5A4-3C54D6C0C8ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7FC09E8-7F30-4FE4-912E-588AA250E2A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*\",\"matchCriteriaId\":\"A586DE4E-8A46-41DE-9FDB-5FDB81DCC87B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*\",\"matchCriteriaId\":\"9919D091-73D7-465A-80FF-F37D6CAF9F46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*\",\"matchCriteriaId\":\"02565D6F-4CB2-4671-A4EF-3169BCFA6154\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*\",\"matchCriteriaId\":\"452A3E51-9EAC-451D-BA04-A1E7B7D917EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E8C6AAC-C90B-4220-A69B-2A886A35CF5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*\",\"matchCriteriaId\":\"55231B6B-9298-4363-9B5A-14C2DA7B1F50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*\",\"matchCriteriaId\":\"E42CF0F7-418C-4BB6-9B73-FA3B9171D092\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5467E9D-07D8-4BEB-84D5-A3136C133519\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*\",\"matchCriteriaId\":\"B83B2CE1-45D7-47AD-BC0A-6EC74D5F8F5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A32F326-EA92-43CD-930E-E527B60CDD3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EA5B9E9-654D-44F7-AE98-3D8B382804AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*\",\"matchCriteriaId\":\"04344167-530E-4A4D-90EF-74C684943DF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0E0373B-201D-408F-9234-A7EFE8B4970D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*\",\"matchCriteriaId\":\"15EAD76D-D5D0-4984-9D07-C1451D791083\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE949EBF-2BC0-4355-8B28-B494023D45FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E0A0A2D-62B9-4A00-84EF-90C15E47A632\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*\",\"matchCriteriaId\":\"A070A282-CBD6-4041-B149-5E310BD12E7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ECAE71B-C549-4EFB-A509-BFD599F5917A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*\",\"matchCriteriaId\":\"44051CFE-D15D-4416-A123-F3E49C67A9E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*\",\"matchCriteriaId\":\"F296ACF3-1373-429D-B991-8B5BA704A7EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B863420B-DE16-416A-9640-1A1340A9B855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*\",\"matchCriteriaId\":\"724C972F-74FE-4044-BBC4-7E0E61FC9002\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*\",\"matchCriteriaId\":\"46F41C15-0EF4-4115-BFAA-EEAD56FAEEDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBE909DE-E55A-4BD3-A5BF-ADE407432193\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DAC04D2-68FD-4793-A8E7-4690A543D7D4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.4.2_29\",\"matchCriteriaId\":\"E1107386-7777-40DF-96FF-11A9A30CABBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63978872-E797-4F13-B0F9-98CB67D0962A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EEAB662-644A-4D7B-8237-64142CF48724\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9598A49-95F2-42DB-B92C-CD026F739B83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BED1009E-AE60-43A0-A0F5-38526EFCF423\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D011585C-0E62-4233-85FA-F29A07D68DA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F226D898-F0E8-41D8-BF40-54DE9FB5426D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CB9CCD1-A67D-4800-9EC5-6E1A0B0B76E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE28C283-447A-4F83-B96B-69F96E663C1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D102063B-2434-4141-98E7-2DE501AE1728\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03B8CD03-CD31-4F4D-BA90-59435578A4F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41A994BF-1F64-480A-8AA5-748DDD0AB68C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88519F2D-AD06-4F05-BEDA-A09216F1B481\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC728978-368D-4B36-B149-70473E92BD1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD5187B1-CB86-48E8-A595-9FCFD9822C0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C660DE4-543A-4E9B-825D-CD099D08CBD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98C1942E-16C0-4EB2-AB57-43EC6EC9C3A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"318719C9-7B01-4021-B2EF-8341254DFE6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB8FA9BA-51CA-4473-9FE1-9A32FB8C8041\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC5E64B6-77DA-44BC-B646-AE01041B1830\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DA35E80-9E0E-4A26-B631-A61542BE4739\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EEB5367-1BB8-4ED3-8C04-ABA6BAA5AD10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BED9E7C8-0418-4733-A496-61CCFD638859\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6566CE32-E042-424A-893B-C8A9E26E2869\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B760192E-7193-4FEF-8FFA-680AC89D45A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C020210-8EBA-41D2-BE4A-962CD902857C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"076444F1-543E-4061-9D39-415A1A889F5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B29C4AA1-30F8-4AA3-A8B5-4125CF9B66F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45BD257F-4310-44C7-A304-2F174FA93C5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A7B39AB-4B2E-40A2-9FB9-0E209DC7F24F\"}]}]}],\"references\":[{\"url\":\"http://blog.fortify.com/blog/2011/02/08/Double-Trouble\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053926.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053934.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130168502603566\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130270785502599\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130497132406206\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130497185606818\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://secunia.com/advisories/43048\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43280\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43295\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43304\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43333\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43378\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43400\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43659\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/44954\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://secunia.com/advisories/45022\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://secunia.com/advisories/45555\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/49198\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201406-32.xml\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IZ94423\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1PM31983\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21468358\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.debian.org/security/2011/dsa-2161\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg24029497\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg24029498\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:054\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0210.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0211.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0212.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0213.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0214.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0282.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0333.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0334.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0880.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id?1025062\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0365\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0377\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0379\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0422\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0434\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0605\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12662\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12745\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14328\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14589\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19493\",\"source\":\"secalert_us@oracle.com\"}]}}" } }
rhsa-2011_0282
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-sun packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise\nLinux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and\nthe Sun Java 6 Software Development Kit.\n\nThis update fixes several vulnerabilities in the Sun Java 6 Runtime\nEnvironment and the Sun Java 6 Software Development Kit. Further\ninformation about these flaws can be found on the \"Oracle Java SE and Java\nfor Business Critical Patch Update Advisory\" page, listed in the References\nsection. (CVE-2010-4422, CVE-2010-4447, CVE-2010-4448, CVE-2010-4450,\nCVE-2010-4451, CVE-2010-4452, CVE-2010-4454, CVE-2010-4462, CVE-2010-4463,\nCVE-2010-4465, CVE-2010-4466, CVE-2010-4467, CVE-2010-4468, CVE-2010-4469,\nCVE-2010-4470, CVE-2010-4471, CVE-2010-4472, CVE-2010-4473, CVE-2010-4475,\nCVE-2010-4476)\n\nAll users of java-1.6.0-sun are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of Sun Java\nmust be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0282", "url": "https://access.redhat.com/errata/RHSA-2011:0282" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html#AppendixJAVA" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "675942", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675942" }, { "category": "external", "summary": "675958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675958" }, { "category": "external", "summary": "675984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675984" }, { "category": "external", "summary": "676005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676005" }, { "category": "external", "summary": "676019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676019" }, { "category": "external", "summary": "676023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676023" }, { "category": "external", "summary": "676026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676026" }, { "category": "external", "summary": "677957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677957" }, { "category": "external", "summary": "677958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677958" }, { "category": "external", "summary": "677959", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677959" }, { "category": "external", "summary": "677960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677960" }, { "category": "external", "summary": "677961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677961" }, { "category": "external", "summary": "677963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677963" }, { "category": "external", "summary": "677966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677966" }, { "category": "external", "summary": "677967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677967" }, { "category": "external", "summary": "677968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677968" }, { "category": "external", "summary": "677969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677969" }, { "category": "external", "summary": "677970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677970" }, { "category": "external", "summary": "677971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677971" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0282.json" } ], "title": "Red Hat Security Advisory: java-1.6.0-sun security update", "tracking": { "current_release_date": "2024-11-14T11:28:09+00:00", "generator": { "date": "2024-11-14T11:28:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2011:0282", "initial_release_date": "2011-02-17T18:12:00+00:00", "revision_history": [ { "date": "2011-02-17T18:12:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-02-17T13:13:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:28:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.24-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.24-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.24-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.24-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.24-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.24-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "product": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "product_id": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.24-1jpp.1.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.24-1jpp.1.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "product_id": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.24-1jpp.1.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.24-1jpp.1.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "product_id": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.24-1jpp.1.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "product_id": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.24-1jpp.1.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.24-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.24-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.24-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.24-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.24-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.24-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.24-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.24-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.24-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.24-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.24-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.24-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.24-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.24-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.24-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.24-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.24-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.24-1jpp.1.el4?arch=i586\u0026epoch=1" } } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "product": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "product_id": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.24-1jpp.1.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "product_id": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.24-1jpp.1.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.24-1jpp.1.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "product_id": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.24-1jpp.1.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.24-1jpp.1.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "product_id": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.24-1jpp.1.el6?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4422", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677971" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4422" }, { "category": "external", "summary": "RHBZ#677971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4422", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4422" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4422", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4422" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4447", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677970" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Deployment, a different vulnerability than CVE-2010-4475.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4447" }, { "category": "external", "summary": "RHBZ#677970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4447", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4447" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4447", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4447" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4448", "discovery_date": "2011-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "676023" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to Networking. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue involves \"DNS cache poisoning by untrusted applets.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK DNS cache poisoning by untrusted applets (6981922)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4448" }, { "category": "external", "summary": "RHBZ#676023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4448", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4448" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4448", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4448" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK DNS cache poisoning by untrusted applets (6981922)" }, { "cve": "CVE-2010-4450", "discovery_date": "2011-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "676026" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier for Solaris and Linux; 5.0 Update 27 and earlier for Solaris and Linux; and 1.4.2_29 and earlier for Solaris and Linux allows local standalone applications to affect confidentiality, integrity, and availability via unknown vectors related to Launcher. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue is an untrusted search path vulnerability involving an empty LD_LIBRARY_PATH environment variable.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Launcher incorrect processing of empty library path entries (6983554)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4450" }, { "category": "external", "summary": "RHBZ#676026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676026" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4450", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4450" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK Launcher incorrect processing of empty library path entries (6983554)" }, { "cve": "CVE-2010-4451", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677969" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier for Windows, when using Java Update, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Install.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Install component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4451" }, { "category": "external", "summary": "RHBZ#677969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677969" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4451", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4451" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4451", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4451" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Install component" }, { "cve": "CVE-2010-4452", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677968" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Deployment component in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4452" }, { "category": "external", "summary": "RHBZ#677968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677968" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4452", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4452" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4452", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4452" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4454", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677967" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs, a different vulnerability than CVE-2010-4462 and CVE-2010-4473.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Sound component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4454" }, { "category": "external", "summary": "RHBZ#677967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677967" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4454", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4454" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4454", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4454" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Sound component" }, { "cve": "CVE-2010-4462", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677966" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs, a different vulnerability than CVE-2010-4454 and CVE-2010-4473.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Sound component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4462" }, { "category": "external", "summary": "RHBZ#677966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677966" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4462", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4462" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4462", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4462" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Sound component" }, { "cve": "CVE-2010-4463", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677963" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 21 through 6 Update 23 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4463" }, { "category": "external", "summary": "RHBZ#677963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677963" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4463", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4463" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4463", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4463" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4465", "discovery_date": "2011-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "675984" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue is related to the lack of framework support by AWT event dispatch, and/or \"clipboard access in Applets.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Swing timer-based security manager bypass (6907662)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4465" }, { "category": "external", "summary": "RHBZ#675984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675984" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4465", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4465" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4465", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4465" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Swing timer-based security manager bypass (6907662)" }, { "cve": "CVE-2010-4466", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677961" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier for Windows, Solaris, and, Linux; 5.0 Update 27 and earlier for Windows; and 1.4.2_29 and earlier for Windows allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4466" }, { "category": "external", "summary": "RHBZ#677961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677961" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4466", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4466" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4467", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677960" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 10 through 6 Update 23 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4467" }, { "category": "external", "summary": "RHBZ#677960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677960" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4467", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4467" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4467", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4467" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4468", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677959" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, and 5.0 Update 27 and earlier, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity via unknown vectors related to JDBC.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in JDBC component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4468" }, { "category": "external", "summary": "RHBZ#677959", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677959" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4468", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4468" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4468", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4468" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK unspecified vulnerability in JDBC component" }, { "cve": "CVE-2010-4469", "discovery_date": "2008-08-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "675958" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to HotSpot. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue is heap corruption related to the Verifier and \"backward jsrs.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Hotspot verifier heap corruption (6878713)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4469" }, { "category": "external", "summary": "RHBZ#675958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675958" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4469", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4469" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4469", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4469" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Hotspot verifier heap corruption (6878713)" }, { "cve": "CVE-2010-4470", "discovery_date": "2011-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "676005" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23, and, and earlier allows remote attackers to affect availability via unknown vectors related to JAXP and unspecified APIs. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue is related to \"Features set on SchemaFactory not inherited by Validator.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK JAXP untrusted component state manipulation (6927050)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4470" }, { "category": "external", "summary": "RHBZ#676005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4470", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4470" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4470", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4470" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK JAXP untrusted component state manipulation (6927050)" }, { "cve": "CVE-2010-4471", "discovery_date": "2010-07-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "676019" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, and 5.0 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to 2D. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue is related to the exposure of system properties via vectors related to Font.createFont and exception text.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Java2D font-related system property leak (6985453)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4471" }, { "category": "external", "summary": "RHBZ#676019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4471", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4471" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4471", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4471" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK Java2D font-related system property leak (6985453)" }, { "cve": "CVE-2010-4472", "discovery_date": "2011-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "675942" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier allows remote attackers to affect availability, related to XML Digital Signature and unspecified APIs. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue involves the replacement of the \"XML DSig Transform or C14N algorithm implementations.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK untrusted code allowed to replace DSIG/C14N implementation (6994263)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4472" }, { "category": "external", "summary": "RHBZ#675942", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675942" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4472", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4472" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4472", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4472" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK untrusted code allowed to replace DSIG/C14N implementation (6994263)" }, { "cve": "CVE-2010-4473", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677958" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs, a different vulnerability than CVE-2010-4454 and CVE-2010-4462.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Sound component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4473" }, { "category": "external", "summary": "RHBZ#677958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677958" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4473", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4473" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Sound component" }, { "cve": "CVE-2010-4475", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677957" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Deployment, a different vulnerability than CVE-2010-4447.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4475" }, { "category": "external", "summary": "RHBZ#677957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677957" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4475", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4475" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011_0290
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-ibm packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise\nLinux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The IBM 1.6.0 Java release includes the IBM Java 2 Runtime Environment and\nthe IBM Java 2 Software Development Kit.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nJava based applications to hang, for example, if they parsed Double values\nin a specially-crafted HTTP request. (CVE-2010-4476)\n\nAll users of java-1.6.0-ibm are advised to upgrade to these updated\npackages, containing the IBM 1.6.0 SR9 Java release. All running instances\nof IBM Java must be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0290", "url": "https://access.redhat.com/errata/RHSA-2011:0290" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://www.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0290.json" } ], "title": "Red Hat Security Advisory: java-1.6.0-ibm security update", "tracking": { "current_release_date": "2024-11-14T11:28:14+00:00", "generator": { "date": "2024-11-14T11:28:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2011:0290", "initial_release_date": "2011-02-22T17:22:00+00:00", "revision_history": [ { "date": "2011-02-22T17:22:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-02-22T12:27:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:28:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.5.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.9.0-1jpp.5.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.5.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.5.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.5.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.5.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.9.0-1jpp.5.el6?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.5.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.9.0-1jpp.5.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.5.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.5.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.5.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.5.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.9.0-1jpp.5.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.4.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.9.0-1jpp.4.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.4.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.9.0-1jpp.4.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.4.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.4.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.4.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.9.0-1jpp.4.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.9.0-1jpp.4.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.4.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.9.0-1jpp.4.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.4.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.4.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.4.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.4.el4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.5.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.9.0-1jpp.5.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.5.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.5.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.5.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.5.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.4.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.4.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.9.0-1jpp.4.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.4.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.4.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.4.el5?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.5.el6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.4.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.9.0-1jpp.4.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.4.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.9.0-1jpp.4.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.4.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.4.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.4.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc", "product": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.9.0-1jpp.4.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.9.0-1jpp.4.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.4.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.9.0-1jpp.4.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.4.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.4.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.4.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.4.el4?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.5.el6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.5.el6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.5.el6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.5.el6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.5.el6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.4.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.4.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.4.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.4.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.4.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x", "product": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x", "product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.9.0-1jpp.4.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.4.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.4.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.4.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.4.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.4.el4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.5.el6?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.4.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.4.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.4.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.4.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.4.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.4.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.4.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.4.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.4.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.4.el4?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.4.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.9.0-1jpp.4.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.4.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.9.0-1jpp.4.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.4.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.4.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.4.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386", "product": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386", "product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.9.0-1jpp.4.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.9.0-1jpp.4.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.4.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.9.0-1jpp.4.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.4.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.4.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.4.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.4.el4?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-22T17:22:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0290" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011_0333
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated jbossweb-2.0.0.jar and jbossweb-2.1.10.jar files for JBoss\nEnterprise SOA Platform 4.3.CP04 and 5.0.2 that fix one security issue are\nnow available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "JBoss Enterprise SOA Platform is the next-generation ESB and business\nprocess automation infrastructure. JBoss Enterprise SOA Platform allows IT\nto leverage existing (MoM and EAI), modern (SOA and BPM-Rules), and future\n(EDA and CEP) integration methodologies to dramatically improve business\nprocess execution speed and quality.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nJBoss Web Server to hang via a specially-crafted HTTP request.\n(CVE-2010-4476)\n\nAll users of JBoss Enterprise SOA Platform 4.3.CP04 and 5.0.2 as provided\nfrom the Red Hat Customer Portal are advised to install this update. Refer\nto the Solution section of this erratum for update instructions.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0333", "url": "https://access.redhat.com/errata/RHSA-2011:0333" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0333.json" } ], "title": "Red Hat Security Advisory: JBoss Enterprise SOA Platform 4.3.CP04 and 5.0.2 security update", "tracking": { "current_release_date": "2024-11-14T11:28:20+00:00", "generator": { "date": "2024-11-14T11:28:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2011:0333", "initial_release_date": "2011-03-09T18:36:00+00:00", "revision_history": [ { "date": "2011-03-09T18:36:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-03-09T13:40:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:28:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss SOA Platform 4.3", "product": { "name": "Red Hat JBoss SOA Platform 4.3", "product_id": "Red Hat JBoss SOA Platform 4.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_soa_platform:4.3" } } }, { "category": "product_name", "name": "Red Hat JBoss SOA Platform 5.0", "product": { "name": "Red Hat JBoss SOA Platform 5.0", "product_id": "Red Hat JBoss SOA Platform 5.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_soa_platform:5.0" } } } ], "category": "product_family", "name": "Red Hat JBoss Middleware" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss SOA Platform 4.3", "Red Hat JBoss SOA Platform 5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-09T18:36:00+00:00", "details": "Updated jbossweb-2.0.0.jar (for 4.3.CP04) and jbossweb-2.1.10.jar (for\n5.0.2) files that fix CVE-2010-4476 for JBoss Enterprise SOA Platform\n4.3.CP04 and 5.0.2 are available from the Red Hat Customer Portal. To\ndownload and install the updated files:\n\n1) Log into the Customer Portal: https://access.redhat.com/login\n\n2) Navigate to\nhttps://access.redhat.com/jbossnetwork/restricted/listSoftware.html\n\n3) On the left-hand side menu, under \"JBoss Enterprise Platforms\" click\n\"SOA Platform\". Then, using the \"Version:\" drop down menu, select the SOA\nPlatform version you are using, such as \"4.3.0.GA_CP04\" or \"5.0.2 GA\".\n\n4) From the \"Security Advisories\" tab, click the \"CVE-2010-4476 JBossweb\nupdate fixing JDK double bug...\" link in the \"Download File\" column. The\n\"Software Details\" page is displayed, where you can download the update\nand view installation instructions.\n\n5) Backup your existing jbossweb.jar file (refer to the \"Software Details\"\npage, from step 4, for the location of this file).\n\n6) After downloading the update, ensure you backed up your existing\njbossweb.jar file as per step 5, and then follow the manual installation\nstep on the \"Software Details\" page. Note that it is recommended to halt\nthe JBoss Enterprise SOA Platform server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the JBoss Enterprise SOA Platform server by starting the\nJBoss Application Server process.", "product_ids": [ "Red Hat JBoss SOA Platform 4.3", "Red Hat JBoss SOA Platform 5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0333" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss SOA Platform 4.3", "Red Hat JBoss SOA Platform 5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011_0210
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated jbossweb packages that fix one security issue are now available for\nJBoss Enterprise Application Platform 4.2, 4.3, and 5.1, for Red Hat\nEnterprise Linux 4 and 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "JBoss Web Server is the web container, based on Apache Tomcat, in JBoss\nEnterprise Application Platform. It provides a single deployment platform\nfor the JavaServer Pages (JSP) and Java Servlet technologies.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nJBoss Web Server to hang via a specially-crafted HTTP request.\n(CVE-2010-4476)\n\nUsers of JBoss Web Server should upgrade to these updated packages, which\ncontain a backported patch to correct this issue. The JBoss server process\nmust be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0210", "url": "https://access.redhat.com/errata/RHSA-2011:0210" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0210.json" } ], "title": "Red Hat Security Advisory: jbossweb security update", "tracking": { "current_release_date": "2024-11-14T11:28:04+00:00", "generator": { "date": "2024-11-14T11:28:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2011:0210", "initial_release_date": "2011-02-10T19:30:00+00:00", "revision_history": [ { "date": "2011-02-10T19:30:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-02-10T14:30:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:28:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product": { "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEAP-5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product": { "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEAP-5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEAP-5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5::el5" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "product": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "product_id": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.0.0-8.CP15.patch01.0jpp.ep1.1.el4?arch=src" } } }, { "category": "product_version", "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src", "product": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src", "product_id": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.0.0-8.CP15.patch01.0jpp.ep1.1.el5?arch=src" } } }, { "category": "product_version", "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "product": { "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "product_id": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.1.10-5.patch01.1.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "product": { "name": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "product_id": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.1.10-5.patch01.1.1.ep5.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "product": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "product_id": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.0.0-8.CP15.patch01.0jpp.ep1.1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch", "product": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch", "product_id": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.0.0-8.CP15.patch01.0jpp.ep1.1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product": { "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_id": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb-servlet-2.5-api@2.1.10-5.patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product": { "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_id": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.1.10-5.patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product": { "name": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_id": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb-lib@2.1.10-5.patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product": { "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_id": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb-jsp-2.1-api@2.1.10-5.patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product": { "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_id": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb-jsp-2.1-api@2.1.10-5.patch01.1.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product": { "name": "jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_id": "jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb-lib@2.1.10-5.patch01.1.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product": { "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_id": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb-servlet-2.5-api@2.1.10-5.patch01.1.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product": { "name": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_id": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.1.10-5.patch01.1.1.ep5.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch" }, "product_reference": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src" }, "product_reference": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src" }, "product_reference": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "relates_to_product_reference": "4AS-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEAP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch" }, "product_reference": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src" }, "product_reference": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch" }, "product_reference": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src" }, "product_reference": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src" }, "product_reference": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "relates_to_product_reference": "4ES-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEAP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch" }, "product_reference": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src" }, "product_reference": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch" }, "product_reference": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src" }, "product_reference": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch" }, "product_reference": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src" }, "product_reference": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" }, "product_reference": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src" }, "product_reference": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "relates_to_product_reference": "5Server-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" }, "product_reference": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEAP-5:jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" }, "product_reference": "jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" }, "product_reference": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-5" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "4AS-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "4AS-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "4ES-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "4ES-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src", "5Server-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "5Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEAP-5:jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-10T19:30:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "4AS-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "4AS-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "4ES-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "4ES-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src", "5Server-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "5Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEAP-5:jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0210" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "4AS-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "4AS-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "4ES-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "4ES-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src", "5Server-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "5Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEAP-5:jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011_0336
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated tomcat5 packages that fix one security issue are now available for\nRed Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nTomcat to hang via a specially-crafted HTTP request. (CVE-2010-4476)\n\nUsers of Tomcat should upgrade to these updated packages, which contain a\nbackported patch to correct this issue. Tomcat must be restarted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0336", "url": "https://access.redhat.com/errata/RHSA-2011:0336" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://tomcat.apache.org/security-5.html", "url": "http://tomcat.apache.org/security-5.html" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0336.json" } ], "title": "Red Hat Security Advisory: tomcat5 security update", "tracking": { "current_release_date": "2024-11-14T11:28:32+00:00", "generator": { "date": "2024-11-14T11:28:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2011:0336", "initial_release_date": "2011-03-09T21:07:00+00:00", "revision_history": [ { "date": "2011-03-09T21:07:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-03-09T16:07:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:28:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product": { "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ia64", "product": { "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ia64", "product_id": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.17.el5_6?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.ia64", "product": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.ia64", "product_id": "tomcat5-0:5.5.23-0jpp.17.el5_6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.17.el5_6?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ia64", "product": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ia64", "product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.17.el5_6?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ia64", "product": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ia64", "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.17.el5_6?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "product": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.17.el5_6?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ia64", "product": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ia64", "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.17.el5_6?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "product": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.17.el5_6?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ia64", "product": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ia64", "product_id": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.17.el5_6?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "product": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.17.el5_6?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "product": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.17.el5_6?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "product": { "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "product_id": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.17.el5_6?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ia64", "product": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ia64", "product_id": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.17.el5_6?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ppc", "product": { "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ppc", "product_id": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.17.el5_6?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.ppc", "product": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.ppc", "product_id": "tomcat5-0:5.5.23-0jpp.17.el5_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.17.el5_6?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc", "product": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc", "product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.17.el5_6?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ppc", "product": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ppc", "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.17.el5_6?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "product": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.17.el5_6?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ppc", "product": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ppc", "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.17.el5_6?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "product": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.17.el5_6?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ppc", "product": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ppc", "product_id": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.17.el5_6?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "product": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.17.el5_6?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "product": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.17.el5_6?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "product": { "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "product_id": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.17.el5_6?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ppc", "product": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ppc", "product_id": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.17.el5_6?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.ppc64", "product": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.ppc64", "product_id": "tomcat5-0:5.5.23-0jpp.17.el5_6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.17.el5_6?arch=ppc64" } } }, { "category": "product_version", "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc64", "product": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc64", "product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.17.el5_6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.s390x", "product": { "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.s390x", "product_id": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.17.el5_6?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.s390x", "product": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.s390x", "product_id": "tomcat5-0:5.5.23-0jpp.17.el5_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.17.el5_6?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.s390x", "product": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.s390x", "product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.17.el5_6?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.s390x", "product": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.s390x", "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.17.el5_6?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "product": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.17.el5_6?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.s390x", "product": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.s390x", "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.17.el5_6?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "product": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.17.el5_6?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.s390x", "product": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.s390x", "product_id": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.17.el5_6?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "product": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.17.el5_6?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "product": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.17.el5_6?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "product": { "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "product_id": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.17.el5_6?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.s390x", "product": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.s390x", "product_id": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.17.el5_6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.x86_64", "product": { "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.x86_64", "product_id": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.17.el5_6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.x86_64", "product": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.x86_64", "product_id": "tomcat5-0:5.5.23-0jpp.17.el5_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.17.el5_6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.x86_64", "product": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.x86_64", "product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.17.el5_6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.x86_64", "product": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.x86_64", "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.17.el5_6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "product": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.17.el5_6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.x86_64", "product": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.x86_64", "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.17.el5_6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "product": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.17.el5_6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "product": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "product_id": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.17.el5_6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.x86_64", "product": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.x86_64", "product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.17.el5_6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "product": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.17.el5_6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.x86_64", "product": { "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.x86_64", "product_id": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.17.el5_6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "product": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "product_id": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.17.el5_6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.i386", "product": { "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.i386", "product_id": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.17.el5_6?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.i386", "product": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.i386", "product_id": "tomcat5-0:5.5.23-0jpp.17.el5_6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.17.el5_6?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.i386", "product": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.i386", "product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.17.el5_6?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.i386", "product": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.i386", "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.17.el5_6?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "product": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.17.el5_6?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.i386", "product": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.i386", "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.17.el5_6?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "product": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.17.el5_6?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.i386", "product": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.i386", "product_id": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.17.el5_6?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.i386", "product": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.i386", "product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.17.el5_6?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "product": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.17.el5_6?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.i386", "product": { "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.i386", "product_id": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.17.el5_6?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.i386", "product": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.i386", "product_id": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.17.el5_6?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.src", "product": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.src", "product_id": "tomcat5-0:5.5.23-0jpp.17.el5_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.17.el5_6?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.i386" }, "product_reference": "tomcat5-0:5.5.23-0jpp.17.el5_6.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.ia64" }, "product_reference": "tomcat5-0:5.5.23-0jpp.17.el5_6.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.ppc" }, "product_reference": "tomcat5-0:5.5.23-0jpp.17.el5_6.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.ppc64" }, "product_reference": "tomcat5-0:5.5.23-0jpp.17.el5_6.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.s390x" }, "product_reference": "tomcat5-0:5.5.23-0jpp.17.el5_6.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.src" }, "product_reference": "tomcat5-0:5.5.23-0jpp.17.el5_6.src", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.x86_64" }, "product_reference": "tomcat5-0:5.5.23-0jpp.17.el5_6.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.i386" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ia64" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ppc" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.s390x" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.x86_64" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.i386" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ia64" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ppc" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.s390x" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.x86_64" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.i386" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ia64" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc64" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.s390x" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.x86_64" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.i386" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ia64" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ppc" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.s390x" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.x86_64" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.i386" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ia64" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ppc" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.s390x" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.i386" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ia64" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ppc" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.s390x" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.x86_64" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.i386" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ia64" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ppc" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.s390x" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.x86_64" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.i386" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ia64" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ppc" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.s390x" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.x86_64" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.i386" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ia64" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ppc" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.s390x" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.x86_64" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.x86_64", "relates_to_product_reference": "5Server-5.6.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.ppc64", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.src", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc64", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-09T21:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.ppc64", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.src", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc64", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0336" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.ppc64", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.src", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc64", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011_0212
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A patch for JBoss Enterprise Application Platform 4.2.0.CP09, 4.3.0.CP09,\nand 5.1 that fixes one security issue is now available from the Red Hat\nCustomer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "JBoss Web Server is the web container, based on Apache Tomcat, in JBoss\nEnterprise Application Platform. It provides a single deployment platform\nfor the JavaServer Pages (JSP) and Java Servlet technologies.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nJBoss Web Server to hang via a specially-crafted HTTP request.\n(CVE-2010-4476)\n\nAll users of Enterprise Application Platform 4.2, 4.3, and 5.1 as provided\nfrom the Red Hat Customer Portal are advised to apply this patch. Refer to\nthe Solution section of this erratum for patch download instructions. The\nJBoss server process must be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0212", "url": "https://access.redhat.com/errata/RHSA-2011:0212" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0212.json" } ], "title": "Red Hat Security Advisory: jbossweb security update", "tracking": { "current_release_date": "2024-11-14T11:28:12+00:00", "generator": { "date": "2024-11-14T11:28:12+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2011:0212", "initial_release_date": "2011-02-10T19:41:00+00:00", "revision_history": [ { "date": "2011-02-10T19:41:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:41:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:28:12+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.2", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.2", "product_id": "Red Hat JBoss Enterprise Application Platform 4.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.3", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.3", "product_id": "Red Hat JBoss Enterprise Application Platform 4.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 5.1", "product": { "name": "Red Hat JBoss Enterprise Application Platform 5.1", "product_id": "Red Hat JBoss Enterprise Application Platform 5.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5.1" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 4.2", "Red Hat JBoss Enterprise Application Platform 4.3", "Red Hat JBoss Enterprise Application Platform 5.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-10T19:41:00+00:00", "details": "A patch to correct CVE-2010-4476 for JBoss Enterprise Application Platform\n4.2.0.CP09, 4.3.0.CP09, and 5.1 is available from the Red Hat Customer\nPortal. To download this patch:\n\n1) Backup your existing JBoss Enterprise Application Platform installation\n(including all applications and configuration files).\n\n2) Log into the Customer Portal: https://access.redhat.com/login\n\n3) Navigate to\nhttps://access.redhat.com/jbossnetwork/restricted/listSoftware.html\n\n4) On the left-hand side menu, under \"JBoss Enterprise Platforms\" click\n\"Application Platform\". Then, use the \"Version:\" drop down menu to select\n\"4.2.0.GA_CP09\", \"4.3.0.GA_CP09\", or \"5.1.0\".\n\n5) The patch is available from the \"Security Advisories\" link. After\napplying the patch, the JBoss server process must be restarted for the\nupdate to take effect.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 4.2", "Red Hat JBoss Enterprise Application Platform 4.3", "Red Hat JBoss Enterprise Application Platform 5.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0212" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 4.2", "Red Hat JBoss Enterprise Application Platform 4.3", "Red Hat JBoss Enterprise Application Platform 5.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011_0335
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated tomcat6 packages that fix two security issues and one bug are now\navailable for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nTomcat to hang via a specially-crafted HTTP request. (CVE-2010-4476)\n\nA flaw was found in the Tomcat NIO (Non-Blocking I/O) connector. A remote\nattacker could use this flaw to cause a denial of service (out-of-memory\ncondition) via a specially-crafted request containing a large NIO buffer\nsize request value. (CVE-2011-0534)\n\nThis update also fixes the following bug:\n\n* A bug in the \"tomcat6\" init script prevented additional Tomcat instances\nfrom starting. As well, running \"service tomcat6 start\" caused\nconfiguration options applied from \"/etc/sysconfig/tomcat6\" to be\noverwritten with those from \"/etc/tomcat6/tomcat6.conf\". With this update,\nmultiple instances of Tomcat run as expected. (BZ#676922)\n\nUsers of Tomcat should upgrade to these updated packages, which contain\nbackported patches to correct these issues. Tomcat must be restarted for\nthis update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0335", "url": "https://access.redhat.com/errata/RHSA-2011:0335" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://tomcat.apache.org/security-6.html", "url": "http://tomcat.apache.org/security-6.html" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "675338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675338" }, { "category": "external", "summary": "676922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676922" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0335.json" } ], "title": "Red Hat Security Advisory: tomcat6 security and bug fix update", "tracking": { "current_release_date": "2024-11-22T04:08:53+00:00", "generator": { "date": "2024-11-22T04:08:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:0335", "initial_release_date": "2011-03-09T20:48:00+00:00", "revision_history": [ { "date": "2011-03-09T20:48:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-03-09T15:52:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:08:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "product": { "name": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "product_id": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.24-24.el6_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "product": { "name": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "product_id": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.24-24.el6_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "product": { "name": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "product_id": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.24-24.el6_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "product": { "name": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "product_id": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.24-24.el6_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "product": { "name": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "product_id": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.24-24.el6_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "product": { "name": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "product_id": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-el-2.1-api@6.0.24-24.el6_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-lib-0:6.0.24-24.el6_0.noarch", "product": { "name": "tomcat6-lib-0:6.0.24-24.el6_0.noarch", "product_id": "tomcat6-lib-0:6.0.24-24.el6_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.24-24.el6_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "product": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "product_id": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.24-24.el6_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-0:6.0.24-24.el6_0.noarch", "product": { "name": "tomcat6-0:6.0.24-24.el6_0.noarch", "product_id": "tomcat6-0:6.0.24-24.el6_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.24-24.el6_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "product": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "product_id": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.24-24.el6_0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "tomcat6-0:6.0.24-24.el6_0.src", "product": { "name": "tomcat6-0:6.0.24-24.el6_0.src", "product_id": "tomcat6-0:6.0.24-24.el6_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.24-24.el6_0?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tomcat6-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-24.el6_0.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tomcat6-0:6.0.24-24.el6_0.src" }, "product_reference": "tomcat6-0:6.0.24-24.el6_0.src", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-lib-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-24.el6_0.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.src" }, "product_reference": "tomcat6-0:6.0.24-24.el6_0.src", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-lib-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tomcat6-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-24.el6_0.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tomcat6-0:6.0.24-24.el6_0.src" }, "product_reference": "tomcat6-0:6.0.24-24.el6_0.src", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-lib-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tomcat6-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-24.el6_0.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tomcat6-0:6.0.24-24.el6_0.src" }, "product_reference": "tomcat6-0:6.0.24-24.el6_0.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tomcat6-lib-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-lib-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tomcat6-log4j-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tomcat6-webapps-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-24.el6_0.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.src" }, "product_reference": "tomcat6-0:6.0.24-24.el6_0.src", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-lib-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tomcat6-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-24.el6_0.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tomcat6-0:6.0.24-24.el6_0.src" }, "product_reference": "tomcat6-0:6.0.24-24.el6_0.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tomcat6-lib-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-lib-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tomcat6-log4j-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tomcat6-webapps-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Client-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.src", "6ComputeNode-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Server-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-0:6.0.24-24.el6_0.src", "6Server:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Workstation-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-0:6.0.24-24.el6_0.src", "6Workstation:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-webapps-0:6.0.24-24.el6_0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-09T20:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Client-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.src", "6ComputeNode-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Server-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-0:6.0.24-24.el6_0.src", "6Server:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Workstation-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-0:6.0.24-24.el6_0.src", "6Workstation:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-webapps-0:6.0.24-24.el6_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0335" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Client-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.src", "6ComputeNode-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Server-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-0:6.0.24-24.el6_0.src", "6Server:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Workstation-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-0:6.0.24-24.el6_0.src", "6Workstation:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-webapps-0:6.0.24-24.el6_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" }, { "cve": "CVE-2011-0534", "discovery_date": "2011-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "675338" } ], "notes": [ { "category": "description", "text": "Apache Tomcat 7.0.0 through 7.0.6 and 6.0.0 through 6.0.30 does not enforce the maxHttpHeaderSize limit for requests involving the NIO HTTP connector, which allows remote attackers to cause a denial of service (OutOfMemoryError) via a crafted request.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: remote DoS via NIO connector", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Client-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.src", "6ComputeNode-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Server-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-0:6.0.24-24.el6_0.src", "6Server:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Workstation-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-0:6.0.24-24.el6_0.src", "6Workstation:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-webapps-0:6.0.24-24.el6_0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0534" }, { "category": "external", "summary": "RHBZ#675338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675338" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0534", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0534" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0534", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0534" } ], "release_date": "2011-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-09T20:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Client-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.src", "6ComputeNode-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Server-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-0:6.0.24-24.el6_0.src", "6Server:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Workstation-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-0:6.0.24-24.el6_0.src", "6Workstation:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-webapps-0:6.0.24-24.el6_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0335" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Client-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.src", "6ComputeNode-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Server-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-0:6.0.24-24.el6_0.src", "6Server:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Workstation-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-0:6.0.24-24.el6_0.src", "6Workstation:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-webapps-0:6.0.24-24.el6_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: remote DoS via NIO connector" } ] }
rhsa-2011_0299
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.4.2-ibm-sap packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 4, 5 and 6 for SAP.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The IBM 1.4.2 SR13-FP8 Java release includes the IBM Java 2 Runtime\nEnvironment and the IBM Java 2 Software Development Kit.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nJava based applications to hang, for example, if they parsed Double values\nin a specially-crafted HTTP request. (CVE-2010-4476)\n\nNote: The java-1.4.2-ibm packages were renamed to java-1.4.2-ibm-sap to\ncorrect a naming overlap; however, java-1.4.2-ibm-sap does not\nautomatically obsolete the previous java-1.4.2-ibm packages for Red Hat\nEnterprise Linux 4 and 5 for SAP. Refer to the RHBA-2010:0491 and\nRHBA-2010:0530 advisories, listed in the References, for further\ninformation.\n\nAll users of java-1.4.2-ibm-sap for Red Hat Enterprise Linux 4, 5 and 6 for\nSAP are advised to upgrade to these updated packages, which contain the IBM\n1.4.2 SR13-FP8 Java release. All running instances of IBM Java must be\nrestarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0299", "url": "https://access.redhat.com/errata/RHSA-2011:0299" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://www.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "https://rhn.redhat.com/errata/RHBA-2010-0491.html", "url": "https://rhn.redhat.com/errata/RHBA-2010-0491.html" }, { "category": "external", "summary": "https://rhn.redhat.com/errata/RHBA-2010-0530.html", "url": "https://rhn.redhat.com/errata/RHBA-2010-0530.html" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0299.json" } ], "title": "Red Hat Security Advisory: java-1.4.2-ibm-sap security update", "tracking": { "current_release_date": "2024-11-14T11:28:29+00:00", "generator": { "date": "2024-11-14T11:28:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2011:0299", "initial_release_date": "2011-02-23T18:40:00+00:00", "revision_history": [ { "date": "2011-02-23T18:40:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-02-23T13:41:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:28:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL 4 AS for SAP", "product": { "name": "RHEL 4 AS for SAP", "product_id": "4AS-SAP", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_sap:4" } } }, { "category": "product_name", "name": "RHEL 5 Server for SAP", "product": { "name": "RHEL 5 Server for SAP", "product_id": "5Server-SAP", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_sap:5" } } } ], "category": "product_family", "name": "RHEL for SAP" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product": { "name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product_id": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-devel@1.4.2.13.8.sap-1jpp.2.el4_8?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product": { "name": "java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product_id": "java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap@1.4.2.13.8.sap-1jpp.2.el4_8?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product": { "name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product_id": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-demo@1.4.2.13.8.sap-1jpp.2.el4_8?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product": { "name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product_id": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-javacomm@1.4.2.13.8.sap-1jpp.2.el4_8?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product": { "name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product_id": "java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-src@1.4.2.13.8.sap-1jpp.2.el4_8?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product": { "name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product_id": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-demo@1.4.2.13.8.sap-1jpp.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product": { "name": "java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product_id": "java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap@1.4.2.13.8.sap-1jpp.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product": { "name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product_id": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-devel@1.4.2.13.8.sap-1jpp.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product": { "name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product_id": "java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-src@1.4.2.13.8.sap-1jpp.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product": { "name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product_id": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-javacomm@1.4.2.13.8.sap-1jpp.2.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64 as a component of RHEL 4 AS for SAP", "product_id": "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "relates_to_product_reference": "4AS-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64 as a component of RHEL 4 AS for SAP", "product_id": "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "relates_to_product_reference": "4AS-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64 as a component of RHEL 4 AS for SAP", "product_id": "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "relates_to_product_reference": "4AS-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64 as a component of RHEL 4 AS for SAP", "product_id": "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "relates_to_product_reference": "4AS-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64 as a component of RHEL 4 AS for SAP", "product_id": "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "relates_to_product_reference": "4AS-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-SAP" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-23T18:40:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0299" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011_0291
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.5.0-ibm packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise\nLinux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment and\nthe IBM Java 2 Software Development Kit.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nJava based applications to hang, for example, if they parsed Double values\nin a specially-crafted HTTP request. (CVE-2010-4476)\n\nAll users of java-1.5.0-ibm are advised to upgrade to these updated\npackages, containing the IBM 1.5.0 SR12-FP3 Java release. All running\ninstances of IBM Java must be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0291", "url": "https://access.redhat.com/errata/RHSA-2011:0291" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://www.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0291.json" } ], "title": "Red Hat Security Advisory: java-1.5.0-ibm security update", "tracking": { "current_release_date": "2024-11-14T11:28:19+00:00", "generator": { "date": "2024-11-14T11:28:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2011:0291", "initial_release_date": "2011-02-22T17:17:00+00:00", "revision_history": [ { "date": "2011-02-22T17:17:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-02-22T12:22:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:28:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.2.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.12.3-1jpp.2.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.2.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.12.3-1jpp.2.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.2.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.2.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.3.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.12.3-1jpp.3.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.3.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.3.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.3.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.12.3-1jpp.2.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.2.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.2.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.2.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.2.el4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.12.3-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.12.3-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.12.3-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386", "product": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386", "product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.12.3-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.12.3-1jpp.2.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.2.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.12.3-1jpp.2.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.2.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.12.3-1jpp.2.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.2.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.2.el4?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.2.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.12.3-1jpp.2.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.2.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.2.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.2.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.3.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.12.3-1jpp.3.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.3.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.3.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.3.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.12.3-1jpp.2.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.2.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.2.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.2.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.2.el4?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.2.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.12.3-1jpp.2.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.2.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.12.3-1jpp.2.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc", "product": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.12.3-1jpp.2.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.2.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.12.3-1jpp.2.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.2.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.3.el6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.12.3-1jpp.3.el6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.12.3-1jpp.3.el6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.12.3-1jpp.2.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.2.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.12.3-1jpp.2.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.2.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.12.3-1jpp.2.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.2.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.2.el4?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.2.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.2.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x", "product": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x", "product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.12.3-1jpp.2.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.2.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.2.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.3.el6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.3.el6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.3.el6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.3.el6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.2.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.2.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.2.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.2.el4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.2.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.2.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.12.3-1jpp.2.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.2.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.2.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.3.el6?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.12.3-1jpp.3.el6?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.2.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.12.3-1jpp.2.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.2.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.2.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.2.el4?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.3.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.12.3-1jpp.3.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.12.3-1jpp.3.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.12.3-1jpp.3.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.3.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.3.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.3.el6?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "6Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "6ComputeNode-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "6ComputeNode-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "6Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Workstation-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "6Workstation-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-22T17:17:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "6Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "6ComputeNode-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "6ComputeNode-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "6Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Workstation-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "6Workstation-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0291" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "6Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "6ComputeNode-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "6ComputeNode-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "6Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Workstation-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "6Workstation-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011_0350
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A patch for JBoss Enterprise Web Server 1.0.1 that fixes two security\nissues is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nTomcat 5 or 6 to hang via a specially-crafted HTTP request. (CVE-2010-4476)\n\nA flaw was found in the Tomcat 6 NIO (Non-Blocking I/O) connector. A remote\nattacker could use this flaw to cause a denial of service (out-of-memory\ncondition) via a specially-crafted request containing a large NIO buffer\nsize request value. (CVE-2011-0534)\n\nAll users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to apply this patch.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0350", "url": "https://access.redhat.com/errata/RHSA-2011:0350" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://tomcat.apache.org/security-5.html", "url": "http://tomcat.apache.org/security-5.html" }, { "category": "external", "summary": "http://tomcat.apache.org/security-6.html", "url": "http://tomcat.apache.org/security-6.html" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=1.0.1", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=1.0.1" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "675338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675338" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0350.json" } ], "title": "Red Hat Security Advisory: tomcat5 and tomcat6 security update", "tracking": { "current_release_date": "2024-11-22T04:09:02+00:00", "generator": { "date": "2024-11-22T04:09:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:0350", "initial_release_date": "2011-03-11T01:04:00+00:00", "revision_history": [ { "date": "2011-03-11T01:04:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-03-10T20:09:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:09:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 1.0", "product": { "name": "Red Hat JBoss Web Server 1.0", "product_id": "Red Hat JBoss Web Server 1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1.0" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-11T01:04:00+00:00", "details": "The References section of this erratum contains a patch download link (you\nmust log in to download the patch). Before applying the patch, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). After applying the patch, the JBoss\nserver process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0350" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" }, { "cve": "CVE-2011-0534", "discovery_date": "2011-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "675338" } ], "notes": [ { "category": "description", "text": "Apache Tomcat 7.0.0 through 7.0.6 and 6.0.0 through 6.0.30 does not enforce the maxHttpHeaderSize limit for requests involving the NIO HTTP connector, which allows remote attackers to cause a denial of service (OutOfMemoryError) via a crafted request.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: remote DoS via NIO connector", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0534" }, { "category": "external", "summary": "RHBZ#675338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675338" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0534", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0534" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0534", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0534" } ], "release_date": "2011-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-11T01:04:00+00:00", "details": "The References section of this erratum contains a patch download link (you\nmust log in to download the patch). Before applying the patch, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). After applying the patch, the JBoss\nserver process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0350" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: remote DoS via NIO connector" } ] }
rhsa-2011_0334
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated jbossweb-2.0.0.jar and jbossweb-2.1.10.jar files for JBoss\nEnterprise Portal Platform 4.3.CP06 and 5.1.0 that fix one security issue\nare now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "JBoss Enterprise Portal Platform is the open source implementation of the\nJava EE suite of services and Portal services running atop JBoss Enterprise\nApplication Platform. It comprises a set of offerings for enterprise\ncustomers who are looking for pre-configured profiles of JBoss Enterprise\nMiddleware components that have been tested and certified together to\nprovide an integrated experience.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nJBoss Web Server to hang via a specially-crafted HTTP request.\n(CVE-2010-4476)\n\nAll users of JBoss Enterprise Portal Platform 4.3.CP06 and 5.1.0 as\nprovided from the Red Hat Customer Portal are advised to install this\nupdate. Refer to the Solution section of this erratum for update\ninstructions.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0334", "url": "https://access.redhat.com/errata/RHSA-2011:0334" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0334.json" } ], "title": "Red Hat Security Advisory: JBoss Enterprise Portal Platform 4.3.CP06 and 5.1.0 security update", "tracking": { "current_release_date": "2024-11-14T11:28:23+00:00", "generator": { "date": "2024-11-14T11:28:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2011:0334", "initial_release_date": "2011-03-09T18:44:00+00:00", "revision_history": [ { "date": "2011-03-09T18:44:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-03-09T13:46:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:28:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Portal 4.3", "product": { "name": "Red Hat JBoss Portal 4.3", "product_id": "Red Hat JBoss Portal 4.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_portal_platform:4.3" } } }, { "category": "product_name", "name": "Red Hat JBoss Portal 5", "product": { "name": "Red Hat JBoss Portal 5", "product_id": "Red Hat JBoss Portal 5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_portal_platform:5" } } } ], "category": "product_family", "name": "Red Hat JBoss Middleware" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal 4.3", "Red Hat JBoss Portal 5" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-09T18:44:00+00:00", "details": "Updated jbossweb-2.0.0.jar (for 4.3.CP06) and jbossweb-2.1.10.jar (for\n5.1.0) files that fix CVE-2010-4476 for JBoss Enterprise Portal Platform\n4.3.CP06 and 5.1.0 are available from the Red Hat Customer Portal. To\ndownload and install the updated files:\n\n1) Log into the Customer Portal: https://access.redhat.com/login\n\n2) Navigate to\nhttps://access.redhat.com/jbossnetwork/restricted/listSoftware.html\n\n3) On the left-hand side menu, under \"JBoss Enterprise Platforms\" click\n\"Portal Platform\". Then, using the \"Version:\" drop down menu, select the\nPortal Platform version you are using, such as \"4.3 CP06\" or \"5.1.0\".\n\n4) From the \"Security Advisories\" tab, click the \"CVE-2010-4476 JBossweb\nupdate fixing JDK double bug...\" link in the \"Download File\" column. The\n\"Software Details\" page is displayed, where you can download the update\nand view installation instructions.\n\n5) Backup your existing jbossweb.jar file (refer to the \"Software Details\"\npage, from step 4, for the location of this file).\n\n6) After downloading the update, ensure you backed up your existing\njbossweb.jar file as per step 5, and then follow the manual installation\nstep on the \"Software Details\" page. After installing the update, the JBoss\nserver process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss Portal 4.3", "Red Hat JBoss Portal 5" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0334" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Portal 4.3", "Red Hat JBoss Portal 5" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011_0213
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated jbossweb packages that fix one security issue are now available for\nJBoss Enterprise Web Platform 5 from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "JBoss Web Server is a web container based on Apache Tomcat. It provides a\nsingle deployment platform for the JavaServer Pages (JSP) and Java Servlet\ntechnologies.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nJBoss Web Server to hang via a specially-crafted HTTP request.\n(CVE-2010-4476)\n\nAll users of JBoss Enterprise Web Platform 5 as provided from the Red Hat\nCustomer Portal are advised to apply this patch. Refer to the Solution\nsection of this erratum for patch download instructions. The JBoss server\nprocess must be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0213", "url": "https://access.redhat.com/errata/RHSA-2011:0213" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0213.json" } ], "title": "Red Hat Security Advisory: jbossweb security update", "tracking": { "current_release_date": "2024-11-14T11:28:17+00:00", "generator": { "date": "2024-11-14T11:28:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2011:0213", "initial_release_date": "2011-02-10T19:42:00+00:00", "revision_history": [ { "date": "2011-02-10T19:42:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-02-10T14:46:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:28:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Platform 5.1", "product": { "name": "Red Hat JBoss Web Platform 5.1", "product_id": "Red Hat JBoss Web Platform 5.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_platform:5.1" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Platform 5.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-10T19:42:00+00:00", "details": "A patch to correct CVE-2010-4476 for JBoss Enterprise Web Platform 5.1 is\navailable from the Red Hat Customer Portal. To download this patch:\n\n1) Backup your existing JBoss Enterprise Web Platform installation\n(including all applications and configuration files).\n\n2) Log into the Customer Portal: https://access.redhat.com/login\n\n3) Navigate to\nhttps://access.redhat.com/jbossnetwork/restricted/listSoftware.html\n\n4) On the left-hand side menu, under \"JBoss Enterprise Platforms\" click\n\"Enterprise Web Platform\". Then, use the \"Version:\" drop down menu to\nselect \"5.1.0\".\n\n5) The patch is available from the \"Security Advisories\" link. After\napplying the patch, the JBoss server process must be restarted for the\nupdate to take effect.", "product_ids": [ "Red Hat JBoss Web Platform 5.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0213" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Platform 5.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011_0292
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.4.2-ibm packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 4 Extras and Red Hat Enterprise\nLinux 5 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The IBM 1.4.2 SR13-FP8 Java release includes the IBM Java 2 Runtime\nEnvironment and the IBM Java 2 Software Development Kit.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nJava based applications to hang, for example, if they parsed Double values\nin a specially-crafted HTTP request. (CVE-2010-4476)\n\nAll users of java-1.4.2-ibm are advised to upgrade to these updated\npackages, which contain the IBM 1.4.2 SR13-FP8 Java release. All running\ninstances of IBM Java must be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0292", "url": "https://access.redhat.com/errata/RHSA-2011:0292" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://www.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0292.json" } ], "title": "Red Hat Security Advisory: java-1.4.2-ibm security update", "tracking": { "current_release_date": "2024-11-14T11:28:24+00:00", "generator": { "date": "2024-11-14T11:28:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2011:0292", "initial_release_date": "2011-02-22T17:17:00+00:00", "revision_history": [ { "date": "2011-02-22T17:17:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-02-22T12:22:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:28:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.3.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.8-1jpp.3.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.3.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.3.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.3.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.4.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.4.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.4.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.4.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.8-1jpp.4.el4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.3.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.8-1jpp.3.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.3.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.3.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386", "product": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386", "product_id": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-plugin@1.4.2.13.8-1jpp.3.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.8-1jpp.3.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.3.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.4.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "product": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "product_id": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-plugin@1.4.2.13.8-1jpp.4.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.4.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.4.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.4.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.8-1jpp.4.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.8-1jpp.4.el4?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.3.el5?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.3.el5?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.3.el5?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.3.el5?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.4.el4?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.4.el4?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.4.el4?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.4.el4?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.3.el5?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.8-1jpp.3.el5?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.3.el5?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.3.el5?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.3.el5?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.4.el4?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.4.el4?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.4.el4?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.4.el4?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.8-1jpp.4.el4?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.3.el5?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.8-1jpp.3.el5?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.3.el5?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.3.el5?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.8-1jpp.3.el5?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.3.el5?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.4.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.4.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.4.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.4.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.8-1jpp.4.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.8-1jpp.4.el4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.3.el5?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.3.el5?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.3.el5?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.3.el5?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.4.el4?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.4.el4?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.4.el4?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.4.el4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.3.el5?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.3.el5?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.3.el5?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.8-1jpp.3.el5?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.3.el5?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.4.el4?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.4.el4?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.4.el4?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.4.el4?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.8-1jpp.4.el4?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-22T17:17:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0292" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011_0348
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated tomcat6 packages that fix two security issues are now available for\nJBoss Enterprise Web Server 1.0.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nTomcat to hang via a specially-crafted HTTP request. (CVE-2010-4476)\n\nA flaw was found in the Tomcat NIO (Non-Blocking I/O) connector. A remote\nattacker could use this flaw to cause a denial of service (out-of-memory\ncondition) via a specially-crafted request containing a large NIO buffer\nsize request value. (CVE-2011-0534)\n\nUsers of Tomcat should upgrade to these updated packages, which contain\nbackported patches to correct these issues. Tomcat must be restarted for\nthis update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0348", "url": "https://access.redhat.com/errata/RHSA-2011:0348" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://tomcat.apache.org/security-6.html", "url": "http://tomcat.apache.org/security-6.html" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "675338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675338" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0348.json" } ], "title": "Red Hat Security Advisory: tomcat6 security update", "tracking": { "current_release_date": "2024-11-22T04:08:58+00:00", "generator": { "date": "2024-11-22T04:08:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:0348", "initial_release_date": "2011-03-11T00:35:00+00:00", "revision_history": [ { "date": "2011-03-11T00:35:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-03-10T19:38:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:08:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product": { "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product": { "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el5" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" }, { "branches": [ { "category": "product_version", "name": "tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_id": "tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.24-11.patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_id": "tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.24-11.patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_id": "tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.24-11.patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_id": "tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.24-11.patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_id": "tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.24-11.patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_id": "tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.24-11.patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_id": "tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.24-11.patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_id": "tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.24-11.patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_id": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.24-11.patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_id": "tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.24-11.patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_id": "tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.24-11.patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_id": "tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.24-11.patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_id": "tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.24-11.patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_id": "tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.24-11.patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_id": "tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.24-11.patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-lib-0:6.0.24-11.patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-lib-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_id": "tomcat6-lib-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.24-11.patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_id": "tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.24-11.patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_id": "tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.24-11.patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_id": "tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.24-11.patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_id": "tomcat6-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.24-11.patch_03.ep5.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "product": { "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "product_id": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.24-11.patch_03.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el5.src", "product": { "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el5.src", "product_id": "tomcat6-0:6.0.24-11.patch_03.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.24-11.patch_03.ep5.el5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src" }, "product_reference": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src" }, "product_reference": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-0:6.0.24-11.patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.src" }, "product_reference": "tomcat6-0:6.0.24-11.patch_03.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.24-11.patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-lib-0:6.0.24-11.patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.src", "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-11T00:35:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.src", "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0348" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.src", "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" }, { "cve": "CVE-2011-0534", "discovery_date": "2011-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "675338" } ], "notes": [ { "category": "description", "text": "Apache Tomcat 7.0.0 through 7.0.6 and 6.0.0 through 6.0.30 does not enforce the maxHttpHeaderSize limit for requests involving the NIO HTTP connector, which allows remote attackers to cause a denial of service (OutOfMemoryError) via a crafted request.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: remote DoS via NIO connector", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.src", "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0534" }, { "category": "external", "summary": "RHBZ#675338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675338" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0534", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0534" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0534", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0534" } ], "release_date": "2011-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-11T00:35:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.src", "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0348" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.src", "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: remote DoS via NIO connector" } ] }
rhsa-2011_0349
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated tomcat5 packages that fix one security issue are now available for\nJBoss Enterprise Web Server 1.0.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nTomcat to hang via a specially-crafted HTTP request. (CVE-2010-4476)\n\nUsers of Tomcat should upgrade to these updated packages, which contain a\nbackported patch to correct this issue. Tomcat must be restarted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0349", "url": "https://access.redhat.com/errata/RHSA-2011:0349" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://tomcat.apache.org/security-5.html", "url": "http://tomcat.apache.org/security-5.html" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0349.json" } ], "title": "Red Hat Security Advisory: tomcat5 security update", "tracking": { "current_release_date": "2024-11-14T11:28:40+00:00", "generator": { "date": "2024-11-14T11:28:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2011:0349", "initial_release_date": "2011-03-11T00:54:00+00:00", "revision_history": [ { "date": "2011-03-11T00:54:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-03-10T19:58:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:28:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el5" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product": { "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product": { "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" }, { "branches": [ { "category": "product_version", "name": "tomcat5-admin-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-admin-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-admin-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-common-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-common-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-common-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jasper-eclipse-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-jasper-eclipse-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-jasper-eclipse-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-eclipse@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-server-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-server-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-server-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jasper-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-jasper-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-jasper-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-servlet-2.4-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-servlet-2.4-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-parent-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-parent-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-parent-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-parent@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-jsp-2.0-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-jsp-2.0-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jasper-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-jasper-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-jasper-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-eclipse@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-parent@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "tomcat5-0:5.5.28-12_patch_03.ep5.el5.src", "product": { "name": "tomcat5-0:5.5.28-12_patch_03.ep5.el5.src", "product_id": "tomcat5-0:5.5.28-12_patch_03.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.28-12_patch_03.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.src", "product": { "name": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.src", "product_id": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.28-18_patch_03.ep5.el4?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.src" }, "product_reference": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.src" }, "product_reference": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.28-12_patch_03.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-12_patch_03.ep5.el5.src" }, "product_reference": "tomcat5-0:5.5.28-12_patch_03.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-admin-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-common-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-jasper-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-eclipse-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-jasper-eclipse-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-parent-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-parent-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-server-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.src", "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-12_patch_03.ep5.el5.src", "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-11T00:54:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.src", "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-12_patch_03.ep5.el5.src", "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0349" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.src", "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-12_patch_03.ep5.el5.src", "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011_0211
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated jbossweb packages that fix one security issue are now available for\nJBoss Enterprise Web Platform 5 for Red Hat Enterprise Linux 4 and 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "JBoss Web Server is a web container based on Apache Tomcat. It provides a\nsingle deployment platform for the JavaServer Pages (JSP) and Java Servlet\ntechnologies.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nJBoss Web Server to hang via a specially-crafted HTTP request.\n(CVE-2010-4476)\n\nUsers of JBoss Web Server should upgrade to these updated packages, which\ncontain a backported patch to correct this issue. The JBoss server process\nmust be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0211", "url": "https://access.redhat.com/errata/RHSA-2011:0211" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0211.json" } ], "title": "Red Hat Security Advisory: jbossweb security update", "tracking": { "current_release_date": "2024-11-14T11:28:08+00:00", "generator": { "date": "2024-11-14T11:28:08+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2011:0211", "initial_release_date": "2011-02-10T19:33:00+00:00", "revision_history": [ { "date": "2011-02-10T19:33:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-02-10T14:36:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:28:08+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Platform 5 for RHEL 4 AS", "product": { "name": "Red Hat JBoss Web Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEWP-5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_platform:5::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Platform 5 for RHEL 4 ES", "product": { "name": "Red Hat JBoss Web Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEWP-5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_platform:5::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Platform 5 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Web Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEWP-5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_platform:5::el5" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Platform" }, { "branches": [ { "category": "product_version", "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product": { "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_id": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb-servlet-2.5-api@2.1.10-5.patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product": { "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_id": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.1.10-5.patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product": { "name": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_id": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb-lib@2.1.10-5.patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product": { "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_id": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb-jsp-2.1-api@2.1.10-5.patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product": { "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_id": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb-jsp-2.1-api@2.1.10-5.patch01.1.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product": { "name": "jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_id": "jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb-lib@2.1.10-5.patch01.1.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product": { "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_id": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb-servlet-2.5-api@2.1.10-5.patch01.1.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product": { "name": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_id": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.1.10-5.patch01.1.1.ep5.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "product": { "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "product_id": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.1.10-5.patch01.1.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "product": { "name": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "product_id": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.1.10-5.patch01.1.1.ep5.el5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src as a component of Red Hat JBoss Web Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src" }, "product_reference": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEWP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEWP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEWP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src as a component of Red Hat JBoss Web Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src" }, "product_reference": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEWP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEWP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEWP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" }, "product_reference": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src as a component of Red Hat JBoss Web Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src" }, "product_reference": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEWP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" }, "product_reference": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEWP-5:jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" }, "product_reference": "jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEWP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" }, "product_reference": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWP-5" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "4AS-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "4AS-JBEWP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "4ES-JBEWP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "5Server-JBEWP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEWP-5:jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEWP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" ], "known_not_affected": [ "4AS-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "4AS-JBEWP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "4ES-JBEWP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-10T19:33:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "5Server-JBEWP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEWP-5:jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEWP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0211" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "5Server-JBEWP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEWP-5:jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEWP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011_0214
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-openjdk packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "These packages provide the OpenJDK 6 Java Runtime Environment and the\nOpenJDK 6 Software Development Kit.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nJava-based applications to hang, for instance if they parse Double values\nin a specially-crafted HTTP request. (CVE-2010-4476)\n\nAll users of java-1.6.0-openjdk are advised to upgrade to these updated\npackages, which resolve this issue. All running instances of OpenJDK Java\nmust be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0214", "url": "https://access.redhat.com/errata/RHSA-2011:0214" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0214.json" } ], "title": "Red Hat Security Advisory: java-1.6.0-openjdk security update", "tracking": { "current_release_date": "2024-11-14T11:28:00+00:00", "generator": { "date": "2024-11-14T11:28:00+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2011:0214", "initial_release_date": "2011-02-11T00:44:00+00:00", "revision_history": [ { "date": "2011-02-11T00:44:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-02-10T19:48:10+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:28:00+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product": { "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.x86_64", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.x86_64", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.18.b17.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.x86_64", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.x86_64", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.18.b17.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.x86_64", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.x86_64", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.18.b17.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.x86_64", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.x86_64", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.18.b17.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.x86_64", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.x86_64", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.18.b17.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.x86_64", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.x86_64", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.18.b17.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.36.b17.el6_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.36.b17.el6_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.36.b17.el6_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.36.b17.el6_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.36.b17.el6_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.36.b17.el6_0?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.i386", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.i386", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.18.b17.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.i386", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.i386", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.18.b17.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.i386", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.i386", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.18.b17.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.i386", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.i386", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.18.b17.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.i386", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.i386", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.18.b17.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.i386", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.i386", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.18.b17.el5?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.src", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.src", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.18.b17.el5?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.36.b17.el6_0?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.36.b17.el6_0?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.36.b17.el6_0?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.36.b17.el6_0?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.36.b17.el6_0?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.36.b17.el6_0?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.36.b17.el6_0?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.i386" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.src", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.i386" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.i386" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.i386" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.i386" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.i386" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.src", "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.x86_64", "6Client-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Client-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Client:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6ComputeNode-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6ComputeNode:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Server-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Server:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Workstation-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Workstation:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-11T00:44:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.src", "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.x86_64", "6Client-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Client-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Client:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6ComputeNode-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6ComputeNode:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Server-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Server:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Workstation-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Workstation:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0214" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.src", "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.x86_64", "6Client-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Client-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Client:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6ComputeNode-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6ComputeNode:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Server-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Server:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Workstation-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Workstation:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011_0880
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Network Satellite 5.4.1 for Red Hat\nEnterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "This update corrects several security vulnerabilities in the IBM Java\nRuntime Environment shipped as part of Red Hat Network Satellite 5.4.1. In\na typical operating environment, these are of low security risk as the\nruntime is not used on untrusted applets.\n\nThis update fixes several vulnerabilities in the IBM Java 2 Runtime\nEnvironment. Detailed vulnerability descriptions are linked from the IBM\n\"Security alerts\" page, listed in the References section. (CVE-2009-3555,\nCVE-2010-1321, CVE-2010-3541, CVE-2010-3548, CVE-2010-3549, CVE-2010-3550,\nCVE-2010-3551, CVE-2010-3553, CVE-2010-3555, CVE-2010-3556, CVE-2010-3557,\nCVE-2010-3558, CVE-2010-3560, CVE-2010-3562, CVE-2010-3563, CVE-2010-3565,\nCVE-2010-3566, CVE-2010-3568, CVE-2010-3569, CVE-2010-3571, CVE-2010-3572,\nCVE-2010-3573, CVE-2010-3574, CVE-2010-4422, CVE-2010-4447, CVE-2010-4448,\nCVE-2010-4452, CVE-2010-4454, CVE-2010-4462, CVE-2010-4463, CVE-2010-4465,\nCVE-2010-4466, CVE-2010-4467, CVE-2010-4468, CVE-2010-4471, CVE-2010-4473,\nCVE-2010-4475, CVE-2010-4476)\n\nUsers of Red Hat Network Satellite 5.4.1 are advised to upgrade to these\nupdated java-1.6.0-ibm packages, which contain the IBM 1.6.0 SR9-FP1 Java\nrelease. For this update to take effect, Red Hat Network Satellite must be\nrestarted. Refer to the Solution section for details.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0880", "url": "https://access.redhat.com/errata/RHSA-2011:0880" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "http://www.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "533125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125" }, { "category": "external", "summary": "582466", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=582466" }, { "category": "external", "summary": "639876", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639876" }, { "category": "external", "summary": "639897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639897" }, { "category": "external", "summary": "639904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639904" }, { "category": "external", "summary": "639909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639909" }, { "category": "external", "summary": "639920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639920" }, { "category": "external", "summary": "639922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639922" }, { "category": "external", "summary": "639925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639925" }, { "category": "external", "summary": "642167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642167" }, { "category": "external", "summary": "642180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642180" }, { "category": "external", "summary": "642187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642187" }, { "category": "external", "summary": "642202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642202" }, { "category": "external", "summary": "642215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642215" }, { "category": "external", "summary": "642558", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642558" }, { "category": "external", "summary": "642559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642559" }, { "category": "external", "summary": "642573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642573" }, { "category": "external", "summary": "642576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642576" }, { "category": "external", "summary": "642585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642585" }, { "category": "external", "summary": "642589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642589" }, { "category": "external", "summary": "642593", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642593" }, { "category": "external", "summary": "642611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642611" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "675984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675984" }, { "category": "external", "summary": "676019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676019" }, { "category": "external", "summary": "676023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676023" }, { "category": "external", "summary": "677957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677957" }, { "category": "external", "summary": "677958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677958" }, { "category": "external", "summary": "677959", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677959" }, { "category": "external", "summary": "677960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677960" }, { "category": "external", "summary": "677961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677961" }, { "category": "external", "summary": "677963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677963" }, { "category": "external", "summary": "677966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677966" }, { "category": "external", "summary": "677967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677967" }, { "category": "external", "summary": "677968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677968" }, { "category": "external", "summary": "677970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677970" }, { "category": "external", "summary": "677971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677971" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0880.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite server IBM Java Runtime security update", "tracking": { "current_release_date": "2024-11-14T11:29:31+00:00", "generator": { "date": "2024-11-14T11:29:31+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.0" } }, "id": "RHSA-2011:0880", "initial_release_date": "2011-06-16T19:13:00+00:00", "revision_history": [ { "date": "2011-06-16T19:13:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-06-16T15:21:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-14T11:29:31+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.4 (RHEL v.5)", "product": { "name": "Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.4::el5" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "product_id": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.1-1jpp.1.el5?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.1-1jpp.1.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.1-1jpp.1.el5?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.1-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.1-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "product_id": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386 as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386 as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Satellite54" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-3555", "cwe": { "id": "CWE-300", "name": "Channel Accessible by Non-Endpoint" }, "discovery_date": "2009-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "533125" } ], "notes": [ { "category": "description", "text": "The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a \"plaintext injection\" attack, aka the \"Project Mogul\" issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "TLS: MITM attacks via session renegotiation", "title": "Vulnerability summary" }, { "category": "other", "text": "Additional information can be found in the Red Hat Knowledgebase article:\nhttps://access.redhat.com/articles/20490", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3555" }, { "category": "external", "summary": "RHBZ#533125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3555", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3555" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555" } ], "release_date": "2009-11-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "TLS: MITM attacks via session renegotiation" }, { "acknowledgments": [ { "names": [ "MIT Kerberos Team" ] }, { "names": [ "Shawn Emery" ], "organization": "Oracle", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2010-1321", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2010-04-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "582466" } ], "notes": [ { "category": "description", "text": "The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator\u0027s checksum field is missing.", "title": "Vulnerability description" }, { "category": "summary", "text": "krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1321" }, { "category": "external", "summary": "RHBZ#582466", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=582466" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1321", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1321" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1321", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1321" } ], "release_date": "2010-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005)" }, { "cve": "CVE-2010-3541", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642202" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is related to missing validation of request headers in the HttpURLConnection class when they are set by applets, which allows remote attackers to bypass the intended security policy.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3541" }, { "category": "external", "summary": "RHBZ#642202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3541", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3541" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004)" }, { "cve": "CVE-2010-3548", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639909" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Naming and Directory Interface (JNDI) component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this allows remote attackers to determine internal IP addresses or \"otherwise-protected internal network names.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK DNS server IP address information leak (6957564)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3548" }, { "category": "external", "summary": "RHBZ#639909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639909" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3548", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3548" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK DNS server IP address information leak (6957564)" }, { "cve": "CVE-2010-3549", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642180" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is an HTTP request splitting vulnerability involving the handling of the chunked transfer encoding method by the HttpURLConnection class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK HttpURLConnection request splitting (6952017)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3549" }, { "category": "external", "summary": "RHBZ#642180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642180" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3549", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3549" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK HttpURLConnection request splitting (6952017)" }, { "cve": "CVE-2010-3550", "discovery_date": "2010-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642559" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Web Start component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Java Web Start component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3550" }, { "category": "external", "summary": "RHBZ#642559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642559" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3550", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3550" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Java Web Start component" }, { "cve": "CVE-2010-3551", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642187" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK local network address disclosure (6952603)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3551" }, { "category": "external", "summary": "RHBZ#642187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642187" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3551", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3551" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK local network address disclosure (6952603)" }, { "cve": "CVE-2010-3553", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642167" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is related to unsafe reflection involving the UIDefault.ProxyLazyValue class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Swing unsafe reflection usage (6622002)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3553" }, { "category": "external", "summary": "RHBZ#642167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3553", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3553" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3553", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3553" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Swing unsafe reflection usage (6622002)" }, { "cve": "CVE-2010-3555", "discovery_date": "2010-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642558" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Deployment component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that the ActiveX Plugin does not properly initialize an object field that is used as a window handle, which allows attackers to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3555" }, { "category": "external", "summary": "RHBZ#642558", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642558" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3555", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3555" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3555", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3555" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-3556", "discovery_date": "2010-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642576" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in 2D component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3556" }, { "category": "external", "summary": "RHBZ#642576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642576" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3556", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3556" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3556", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3556" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK unspecified vulnerability in 2D component" }, { "cve": "CVE-2010-3557", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639904" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is related to the modification of \"behavior and state of certain JDK classes\" and \"mutable static.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Swing mutable static (6938813)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3557" }, { "category": "external", "summary": "RHBZ#639904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3557", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3557" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Swing mutable static (6938813)" }, { "cve": "CVE-2010-3558", "discovery_date": "2010-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642593" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Web Start component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Java Web Start component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3558" }, { "category": "external", "summary": "RHBZ#642593", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642593" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3558", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3558" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK unspecified vulnerability in Java Web Start component" }, { "cve": "CVE-2010-3560", "discovery_date": "2010-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642573" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Networking component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3560" }, { "category": "external", "summary": "RHBZ#642573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642573" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3560", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3560" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3560", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3560" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JDK unspecified vulnerability in Networking component" }, { "cve": "CVE-2010-3562", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639897" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is a double free vulnerability in IndexColorModel that allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK IndexColorModel double-free (6925710)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3562" }, { "category": "external", "summary": "RHBZ#639897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639897" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3562", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3562" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3562", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3562" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK IndexColorModel double-free (6925710)" }, { "cve": "CVE-2010-3563", "discovery_date": "2010-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642589" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Deployment component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to \"how Web Start retrieves security policies,\" BasicServiceImpl, and forged policies that bypass sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3563" }, { "category": "external", "summary": "RHBZ#642589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3563", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3563" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3563", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3563" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-3565", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639920" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow that triggers memory corruption via large values in a subsample of a JPEG image, related to JPEGImageWriter.writeImage in the imageio API.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK JPEG writeImage remote code execution (6963023)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3565" }, { "category": "external", "summary": "RHBZ#639920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639920" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3565", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3565" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK JPEG writeImage remote code execution (6963023)" }, { "cve": "CVE-2010-3566", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639922" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update and 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow that leads to a buffer overflow via a crafted devs (device information) tag structure in a color profile.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK ICC Profile remote code execution (6963489)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3566" }, { "category": "external", "summary": "RHBZ#639922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639922" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3566", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3566" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3566", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3566" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK ICC Profile remote code execution (6963489)" }, { "cve": "CVE-2010-3568", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639876" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is a race condition related to deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Deserialization Race condition (6559775)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3568" }, { "category": "external", "summary": "RHBZ#639876", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639876" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3568", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3568" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3568", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3568" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Deserialization Race condition (6559775)" }, { "cve": "CVE-2010-3569", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639925" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this allows remote attackers to execute arbitrary code by causing the defaultReadObject method in the Serialization API to set a volatile field multiple times.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Serialization inconsistencies (6966692)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3569" }, { "category": "external", "summary": "RHBZ#639925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639925" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3569", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3569" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3569", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3569" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Serialization inconsistencies (6966692)" }, { "cve": "CVE-2010-3571", "discovery_date": "2010-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642585" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow in the color profile parser that allows remote attackers to execute arbitrary code via a crafted Tag structure in a color profile.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in 2D component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3571" }, { "category": "external", "summary": "RHBZ#642585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642585" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3571", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3571" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3571", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3571" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK unspecified vulnerability in 2D component" }, { "cve": "CVE-2010-3572", "discovery_date": "2010-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642611" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Sound component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3572" }, { "category": "external", "summary": "RHBZ#642611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642611" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3572", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3572" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3572", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3572" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK unspecified vulnerability in Sound component" }, { "cve": "CVE-2010-3573", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642202" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is related to missing validation of request headers in the HttpURLConnection class when they are set by applets, which allows remote attackers to bypass the intended security policy.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3573" }, { "category": "external", "summary": "RHBZ#642202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3573", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3573" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004)" }, { "cve": "CVE-2010-3574", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642215" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that HttpURLConnection does not properly check for the allowHttpTrace permission, which allows untrusted code to perform HTTP TRACE requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK HttpURLConnection incomplete TRACE permission check (6981426)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3574" }, { "category": "external", "summary": "RHBZ#642215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642215" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3574", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3574" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3574", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3574" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK HttpURLConnection incomplete TRACE permission check (6981426)" }, { "cve": "CVE-2010-4422", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677971" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4422" }, { "category": "external", "summary": "RHBZ#677971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4422", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4422" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4422", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4422" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4447", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677970" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Deployment, a different vulnerability than CVE-2010-4475.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4447" }, { "category": "external", "summary": "RHBZ#677970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4447", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4447" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4447", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4447" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4448", "discovery_date": "2011-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "676023" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to Networking. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue involves \"DNS cache poisoning by untrusted applets.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK DNS cache poisoning by untrusted applets (6981922)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4448" }, { "category": "external", "summary": "RHBZ#676023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4448", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4448" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4448", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4448" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK DNS cache poisoning by untrusted applets (6981922)" }, { "cve": "CVE-2010-4452", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677968" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Deployment component in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4452" }, { "category": "external", "summary": "RHBZ#677968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677968" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4452", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4452" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4452", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4452" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4454", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677967" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs, a different vulnerability than CVE-2010-4462 and CVE-2010-4473.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Sound component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4454" }, { "category": "external", "summary": "RHBZ#677967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677967" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4454", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4454" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4454", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4454" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Sound component" }, { "cve": "CVE-2010-4462", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677966" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs, a different vulnerability than CVE-2010-4454 and CVE-2010-4473.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Sound component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4462" }, { "category": "external", "summary": "RHBZ#677966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677966" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4462", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4462" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4462", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4462" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Sound component" }, { "cve": "CVE-2010-4463", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677963" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 21 through 6 Update 23 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4463" }, { "category": "external", "summary": "RHBZ#677963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677963" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4463", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4463" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4463", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4463" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4465", "discovery_date": "2011-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "675984" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue is related to the lack of framework support by AWT event dispatch, and/or \"clipboard access in Applets.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Swing timer-based security manager bypass (6907662)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4465" }, { "category": "external", "summary": "RHBZ#675984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675984" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4465", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4465" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4465", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4465" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Swing timer-based security manager bypass (6907662)" }, { "cve": "CVE-2010-4466", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677961" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier for Windows, Solaris, and, Linux; 5.0 Update 27 and earlier for Windows; and 1.4.2_29 and earlier for Windows allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4466" }, { "category": "external", "summary": "RHBZ#677961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677961" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4466", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4466" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4467", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677960" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 10 through 6 Update 23 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4467" }, { "category": "external", "summary": "RHBZ#677960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677960" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4467", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4467" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4467", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4467" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4468", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677959" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, and 5.0 Update 27 and earlier, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity via unknown vectors related to JDBC.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in JDBC component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4468" }, { "category": "external", "summary": "RHBZ#677959", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677959" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4468", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4468" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4468", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4468" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK unspecified vulnerability in JDBC component" }, { "cve": "CVE-2010-4471", "discovery_date": "2010-07-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "676019" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, and 5.0 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to 2D. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue is related to the exposure of system properties via vectors related to Font.createFont and exception text.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Java2D font-related system property leak (6985453)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4471" }, { "category": "external", "summary": "RHBZ#676019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4471", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4471" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4471", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4471" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK Java2D font-related system property leak (6985453)" }, { "cve": "CVE-2010-4473", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677958" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs, a different vulnerability than CVE-2010-4454 and CVE-2010-4462.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Sound component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4473" }, { "category": "external", "summary": "RHBZ#677958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677958" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4473", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4473" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Sound component" }, { "cve": "CVE-2010-4475", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677957" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Deployment, a different vulnerability than CVE-2010-4447.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4475" }, { "category": "external", "summary": "RHBZ#677957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677957" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4475", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4475" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
gsd-2010-4476
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2010-4476", "description": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "id": "GSD-2010-4476", "references": [ "https://www.suse.com/security/cve/CVE-2010-4476.html", "https://www.debian.org/security/2011/dsa-2161", "https://access.redhat.com/errata/RHSA-2011:0880", "https://access.redhat.com/errata/RHSA-2011:0350", "https://access.redhat.com/errata/RHSA-2011:0349", "https://access.redhat.com/errata/RHSA-2011:0348", "https://access.redhat.com/errata/RHSA-2011:0336", "https://access.redhat.com/errata/RHSA-2011:0335", "https://access.redhat.com/errata/RHSA-2011:0334", "https://access.redhat.com/errata/RHSA-2011:0333", "https://access.redhat.com/errata/RHSA-2011:0299", "https://access.redhat.com/errata/RHSA-2011:0292", "https://access.redhat.com/errata/RHSA-2011:0291", "https://access.redhat.com/errata/RHSA-2011:0290", "https://access.redhat.com/errata/RHSA-2011:0282", "https://access.redhat.com/errata/RHSA-2011:0214", "https://access.redhat.com/errata/RHSA-2011:0213", "https://access.redhat.com/errata/RHSA-2011:0212", "https://access.redhat.com/errata/RHSA-2011:0211", "https://access.redhat.com/errata/RHSA-2011:0210", "https://linux.oracle.com/cve/CVE-2010-4476.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2010-4476" ], "details": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "id": "GSD-2010-4476", "modified": "2023-12-13T01:21:30.370055Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2010-4476", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "43295", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43295" }, { "name": "1025062", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025062" }, { "name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html", "refsource": "CONFIRM", "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html" }, { "name": "43280", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43280" }, { "name": "RHSA-2011:0210", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0210.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html" }, { "name": "GLSA-201406-32", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "oval:org.mitre.oval:def:14328", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14328" }, { "name": "HPSBMU02799", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "name": "FEDORA-2011-1231", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053926.html" }, { "name": "FEDORA-2011-1263", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053934.html" }, { "name": "SUSE-SU-2011:0823", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html" }, { "name": "HPSBNS02633", "refsource": "HP", "url": "http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" }, { "name": "SSRT100387", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "name": "HPSBUX02860", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "name": "RHSA-2011:0214", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0214.html" }, { "name": "PM31983", "refsource": "AIXAPAR", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM31983" }, { "name": "45555", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/45555" }, { "name": "IZ94423", "refsource": "AIXAPAR", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ94423" }, { "name": "43400", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43400" }, { "name": "SSRT100412", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "name": "HPSBMA02642", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "name": "43378", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43378" }, { "name": "45022", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/45022" }, { "name": "RHSA-2011:0333", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0333.html" }, { "name": "ADV-2011-0422", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0422" }, { "name": "oval:org.mitre.oval:def:12662", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12662" }, { "name": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html" }, { "name": "HPSBMU02690", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "name": "ADV-2011-0434", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0434" }, { "name": "HPSBUX02633", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "name": "HPSBOV02762", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "name": "oval:org.mitre.oval:def:14589", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14589" }, { "name": "HPSBUX02641", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "name": "RHSA-2011:0213", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0213.html" }, { "name": "SSRT100627", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "name": "http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/", "refsource": "MISC", "url": "http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/" }, { "name": "ADV-2011-0377", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0377" }, { "name": "44954", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44954" }, { "name": "HPSBOV02634", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130497132406206\u0026w=2" }, { "name": "ADV-2011-0365", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0365" }, { "name": "SSRT100415", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "name": "http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html", "refsource": "CONFIRM", "url": "http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html" }, { "name": "RHSA-2011:0880", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html" }, { "name": "oval:org.mitre.oval:def:12745", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12745" }, { "name": "RHSA-2011:0334", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0334.html" }, { "name": "RHSA-2011:0282", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0282.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21468358", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468358" }, { "name": "43048", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43048" }, { "name": "DSA-2161", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2161" }, { "name": "SSRT100825", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "name": "ADV-2011-0379", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0379" }, { "name": "43304", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43304" }, { "name": "RHSA-2011:0211", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0211.html" }, { "name": "SSRT100390", "refsource": "HP", "url": "http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" }, { "name": "SSRT100867", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "name": "49198", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49198" }, { "name": "43659", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43659" }, { "name": "http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg24029498", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg24029498" }, { "name": "HPSBUX02725", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "name": "SUSE-SA:2011:024", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html" }, { "name": "HPSBUX02777", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "oval:org.mitre.oval:def:19493", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19493" }, { "name": "43333", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43333" }, { "name": "SSRT101146", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "name": "SSRT100569", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "name": "HPSBUX02645", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130168502603566\u0026w=2" }, { "name": "RHSA-2011:0212", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0212.html" }, { "name": "HPSBUX02642", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130270785502599\u0026w=2" }, { "name": "SSRT100854", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html", "refsource": "CONFIRM", "url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html" }, { "name": "ADV-2011-0605", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0605" }, { "name": "http://blog.fortify.com/blog/2011/02/08/Double-Trouble", "refsource": "MISC", "url": "http://blog.fortify.com/blog/2011/02/08/Double-Trouble" }, { "name": "HPSBTU02684", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130497185606818\u0026w=2" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg24029497", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg24029497" }, { "name": "MDVSA-2011:054", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:054" }, { "name": "HPSBMU02797", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_22:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:*:update_23:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.6.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_22:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:*:update_23:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.6.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update26:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:*:update27:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update25:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.4.2_29", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:*:update27:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.4.2_29", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2010-4476" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html" }, { "name": "RHSA-2011:0214", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0214.html" }, { "name": "PM31983", "refsource": "AIXAPAR", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM31983" }, { "name": "FEDORA-2011-1231", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053926.html" }, { "name": "DSA-2161", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2011/dsa-2161" }, { "name": "RHSA-2011:0282", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0282.html" }, { "name": "43400", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43400" }, { "name": "ADV-2011-0422", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0422" }, { "name": "RHSA-2011:0211", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0211.html" }, { "name": "IZ94423", "refsource": "AIXAPAR", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ94423" }, { "name": "ADV-2011-0434", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0434" }, { "name": "RHSA-2011:0213", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0213.html" }, { "name": "43280", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43280" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21468358", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468358" }, { "name": "FEDORA-2011-1263", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053934.html" }, { "name": "HPSBNS02633", "refsource": "HP", "tags": [], "url": "http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" }, { "name": "ADV-2011-0365", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0365" }, { "name": "43378", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43378" }, { "name": "43304", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43304" }, { "name": "43295", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43295" }, { "name": "ADV-2011-0379", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0379" }, { "name": "RHSA-2011:0212", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0212.html" }, { "name": "http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html", "refsource": "CONFIRM", "tags": [], "url": "http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html" }, { "name": "1025062", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id?1025062" }, { "name": "ADV-2011-0377", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0377" }, { "name": "RHSA-2011:0210", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0210.html" }, { "name": "http://blog.fortify.com/blog/2011/02/08/Double-Trouble", "refsource": "MISC", "tags": [], "url": "http://blog.fortify.com/blog/2011/02/08/Double-Trouble" }, { "name": "43048", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43048" }, { "name": "43333", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43333" }, { "name": "http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html" }, { "name": "http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/", "refsource": "MISC", "tags": [], "url": "http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/" }, { "name": "RHSA-2011:0334", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0334.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html" }, { "name": "RHSA-2011:0333", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0333.html" }, { "name": "45555", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45555" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg24029498", "refsource": "CONFIRM", "tags": [], "url": "http://www.ibm.com/support/docview.wss?uid=swg24029498" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg24029497", "refsource": "CONFIRM", "tags": [], "url": "http://www.ibm.com/support/docview.wss?uid=swg24029497" }, { "name": "RHSA-2011:0880", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html" }, { "name": "HPSBMA02642", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "name": "MDVSA-2011:054", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:054" }, { "name": "HPSBMU02690", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "name": "ADV-2011-0605", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0605" }, { "name": "SSRT100412", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "name": "SUSE-SA:2011:024", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html" }, { "name": "SUSE-SU-2011:0823", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html" }, { "name": "43659", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43659" }, { "name": "44954", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/44954" }, { "name": "45022", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/45022" }, { "name": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html", "refsource": "CONFIRM", "tags": [], "url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html" }, { "name": "49198", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/49198" }, { "name": "SSRT100627", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "name": "HPSBUX02860", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "name": "GLSA-201406-32", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html" }, { "name": "SSRT100867", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "name": "HPSBUX02642", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=130270785502599\u0026w=2" }, { "name": "HPSBTU02684", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=130497185606818\u0026w=2" }, { "name": "HPSBOV02762", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "name": "HPSBOV02634", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=130497132406206\u0026w=2" }, { "name": "SSRT100387", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "name": "HPSBUX02777", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "HPSBUX02645", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=130168502603566\u0026w=2" }, { "name": "oval:org.mitre.oval:def:19493", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19493" }, { "name": "oval:org.mitre.oval:def:14589", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14589" }, { "name": "oval:org.mitre.oval:def:14328", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14328" }, { "name": "oval:org.mitre.oval:def:12745", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12745" }, { "name": "oval:org.mitre.oval:def:12662", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12662" }, { "name": "HPSBMU02799", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-30T16:26Z", "publishedDate": "2011-02-17T19:00Z" } } }
cve-2010-4476
Vulnerability from jvndb
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000018.html", "dc:date": "2018-02-07T17:10+09:00", "dcterms:issued": "2011-03-04T19:28+09:00", "dcterms:modified": "2018-02-07T17:10+09:00", "description": "IBM Lotus product line contains a denial-of-service (DoS) vulnerability.\r\n\r\nIBM Lotus product line contains a denial-of-service (DoS) vulnerability due to an issue in Java Runtime Environment (JRE).", "link": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000018.html", "sec:cpe": [ { "#text": "cpe:/a:hp:systems_insight_manager", "@product": "HP Systems Insight Manager", "@vendor": "Hewlett-Packard Development Company,L.P", "@version": "2.2" }, { "#text": "cpe:/a:ibm:ibm_forms", "@product": "IBM Forms", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:ibm_mashup_center", "@product": "IBM Mashup Center", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:lotus_activeinsight", "@product": "Lotus ActiveInsight", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:lotus_connections", "@product": "Lotus Connections", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:lotus_expeditor", "@product": "IBM Lotus Expeditor", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:lotus_mashups", "@product": "Lotus Mashups", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:lotus_quickr", "@product": "IBM Lotus Quickr", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:lotus_sametime_advanced", "@product": "Lotus Sametime Advanced", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:lotus_sametime_standard", "@product": "Lotus Sametime Standard", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:lotus_sametime_unified_telephony", "@product": "Lotus Sametime Unified Telephony", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:lotus_web_content_management", "@product": "Lotus Web Content Management", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:lotus_workforce_management", "@product": "Lotus Workforce Management", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:websphere_dashboard_framework", "@product": "IBM WebSphere Dashboard Framework", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:websphere_portlet_factory", "@product": "WebSphere Portlet Factory", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:workplace_web_content_management", "@product": "Workplace Web Content Management", "@vendor": "IBM Corporation", "@version": "2.2" } ], "sec:cvss": { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "@version": "2.0" }, "sec:identifier": "JVNDB-2011-000018", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN97334690/index.html", "@id": "JVN#97334690", "@source": "JVN" }, { "#text": "https://jvn.jp/en/tr/JVNTR-2011-02/index.html", "@id": "JVNTR-2011-02", "@source": "JVNTR" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4476", "@id": "CVE-2010-4476", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4476", "@id": "CVE-2010-4476", "@source": "NVD" }, { "#text": "http://secunia.com/advisories/43295", "@id": "SA43295", "@source": "SECUNIA" }, { "#text": "http://www.securitytracker.com/id?1025062", "@id": "1025062", "@source": "SECTRACK" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-189", "@title": "Numeric Errors(CWE-189)" } ], "title": "IBM Lotus vulnerable to denial-of-service (DoS)" }
cve-2010-4476
Vulnerability from jvndb
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000017.html", "dc:date": "2018-02-07T17:10+09:00", "dcterms:issued": "2011-03-04T19:29+09:00", "dcterms:modified": "2018-02-07T17:10+09:00", "description": "IBM WebSphere Application Server (WAS) contains a denial-of-service (DoS) vulnerability.\r\n\r\nIBM WebSphere Application Server contains a denial-of-service (DoS) vulnerability due to an issue in Java Runtime Environment (JRE).\r\n\r\nAccording to the developer:\r\n\r\n\" For other IBM software products that contain an affected version of WAS, require an update. Specifically, WebSphere Process Server (WPS), WebSphere Enterprise Service Bus (WESB), WebSphere Virtual Enterprise (WVE), WebSphere Commerce and others are applicable. Also, IBM HTTP Server is not affected by this vulnerability.\"", "link": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000017.html", "sec:cpe": [ { "#text": "cpe:/a:hp:systems_insight_manager", "@product": "HP Systems Insight Manager", "@vendor": "Hewlett-Packard Development Company,L.P", "@version": "2.2" }, { "#text": "cpe:/a:ibm:websphere_application_server", "@product": "IBM WebSphere Application Server", "@vendor": "IBM Corporation", "@version": "2.2" } ], "sec:cvss": { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "@version": "2.0" }, "sec:identifier": "JVNDB-2011-000017", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN26301278/index.html", "@id": "JVN#26301278", "@source": "JVN" }, { "#text": "https://jvn.jp/en/tr/JVNTR-2011-02/index.html", "@id": "JVNTR-2011-02", "@source": "JVNTR" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4476", "@id": "CVE-2010-4476", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4476", "@id": "CVE-2010-4476", "@source": "NVD" }, { "#text": "http://secunia.com/advisories/43295", "@id": "SA43295", "@source": "SECUNIA" }, { "#text": "http://www.securitytracker.com/id?1025062", "@id": "1025062", "@source": "SECTRACK" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-189", "@title": "Numeric Errors(CWE-189)" } ], "title": "IBM WebSphere Application Server vulnerable to denial-of-service (DoS)" }
cve-2010-4476
Vulnerability from jvndb
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000020.html", "dc:date": "2018-02-07T17:10+09:00", "dcterms:issued": "2011-03-10T16:38+09:00", "dcterms:modified": "2018-02-07T17:10+09:00", "description": "IBM Tivoli contains a denial-of-service (DoS) vulnerability.\r\n\r\nIBM Tivoli contains a denial-of-service (DoS) vulnerability due to an issue in Java Runtime Environment (JRE).\r\n\r\nA wide range of products are affected. For more information, refer to the vendor\u0027s website.", "link": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000020.html", "sec:cpe": [ { "#text": "cpe:/a:hp:systems_insight_manager", "@product": "HP Systems Insight Manager", "@vendor": "Hewlett-Packard Development Company,L.P", "@version": "2.2" }, { "#text": "cpe:/a:sun:jdk", "@product": "JDK", "@vendor": "Sun Microsystems, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:sun:jre", "@product": "JRE", "@vendor": "Sun Microsystems, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:sun:sdk", "@product": "SDK", "@vendor": "Sun Microsystems, Inc.", "@version": "2.2" } ], "sec:cvss": { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "@version": "2.0" }, "sec:identifier": "JVNDB-2011-000020", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN81294135/index.html", "@id": "JVN#81294135", "@source": "JVN" }, { "#text": "https://jvn.jp/en/tr/JVNTR-2011-02/index.html", "@id": "JVNTR-2011-02", "@source": "JVNTR" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4476", "@id": "CVE-2010-4476", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4476", "@id": "CVE-2010-4476", "@source": "NVD" }, { "#text": "http://www.securitytracker.com/id?1025062", "@id": "1025062", "@source": "SECTRACK" }, { "#text": "http://secunia.com/advisories/43295", "@id": "SA43295", "@source": "SECUNIA-R" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-189", "@title": "Numeric Errors(CWE-189)" } ], "title": "IBM Tivoli vulnerable to denial-of-service (DoS)" }
cve-2010-4476
Vulnerability from jvndb
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000016.html", "dc:date": "2018-02-07T17:10+09:00", "dcterms:issued": "2011-03-04T19:29+09:00", "dcterms:modified": "2018-02-07T17:10+09:00", "description": "IBM DB2 contains a denial-of-service (DoS) vulnerability.\r\n\r\nIBM DB2 contains a denial-of-service (DoS) vulnerability due to an issue in Java Runtime Environment (JRE).", "link": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000016.html", "sec:cpe": [ { "#text": "cpe:/a:hp:systems_insight_manager", "@product": "HP Systems Insight Manager", "@vendor": "Hewlett-Packard Development Company,L.P", "@version": "2.2" }, { "#text": "cpe:/a:ibm:db2", "@product": "IBM DB2", "@vendor": "IBM Corporation", "@version": "2.2" } ], "sec:cvss": { "@score": "4.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "@version": "2.0" }, "sec:identifier": "JVNDB-2011-000016", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN16308183/index.html", "@id": "JVN#16308183", "@source": "JVN" }, { "#text": "https://jvn.jp/en/tr/JVNTR-2011-02/index.html", "@id": "JVNTR-2011-02", "@source": "JVNTR" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4476", "@id": "CVE-2010-4476", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4476", "@id": "CVE-2010-4476", "@source": "NVD" }, { "#text": "http://secunia.com/advisories/43295", "@id": "SA43295", "@source": "SECUNIA" }, { "#text": "http://www.securitytracker.com/id?1025062", "@id": "1025062", "@source": "SECTRACK" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-189", "@title": "Numeric Errors(CWE-189)" } ], "title": "IBM DB2 vulnerable to denial-of-service (DoS)" }
ghsa-gvgc-rxmh-5hvw
Vulnerability from github
The Double.parseDouble
method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
Apache Tomcat introduced workarounds to avoid being affected by this issue in versions 7.0.7, 6.0.32, and 5.5.33.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat" }, "ranges": [ { "events": [ { "introduced": "7.0.0" }, { "fixed": "7.0.7" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat" }, "ranges": [ { "events": [ { "introduced": "6.0.0" }, { "fixed": "6.0.32" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat" }, "ranges": [ { "events": [ { "introduced": "5.5.0" }, { "fixed": "5.5.33" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2010-4476" ], "database_specific": { "cwe_ids": [], "github_reviewed": true, "github_reviewed_at": "2024-02-27T21:57:19Z", "nvd_published_at": "2011-02-17T19:00:00Z", "severity": "MODERATE" }, "details": "The `Double.parseDouble` method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.\n\nApache Tomcat introduced workarounds to avoid being affected by this issue in versions 7.0.7, 6.0.32, and 5.5.33.", "id": "GHSA-gvgc-rxmh-5hvw", "modified": "2024-02-27T21:57:20Z", "published": "2022-05-14T02:16:07Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/407841c426dc52a4c6b8ccd297df6c484a540056" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/69ef147c4498397e8f644a0699cf588b45a05120" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/b0c1eeaa0d303bcb42651b222037e079d0634c01" }, { "type": "PACKAGE", "url": "https://github.com/apache/tomcat" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12662" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12745" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14328" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14589" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19493" }, { "type": "WEB", "url": "https://svn.apache.org/viewvc?view=revision\u0026revision=1066244" }, { "type": "WEB", "url": "https://svn.apache.org/viewvc?view=revision\u0026revision=1066315" }, { "type": "WEB", "url": "https://svn.apache.org/viewvc?view=revision\u0026revision=1066318" }, { "type": "WEB", "url": "https://tomcat.apache.org/security-5.html" }, { "type": "WEB", "url": "https://tomcat.apache.org/security-6.html" }, { "type": "WEB", "url": "https://tomcat.apache.org/security-7.html" }, { "type": "WEB", "url": "http://blog.fortify.com/blog/2011/02/08/Double-Trouble" }, { "type": "WEB", "url": "http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053926.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053934.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=130168502603566\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=130270785502599\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=130497132406206\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=130497185606818\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "type": "WEB", "url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ94423" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM31983" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468358" }, { "type": "WEB", "url": "http://www.debian.org/security/2011/dsa-2161" }, { "type": "WEB", "url": "http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308" }, { "type": "WEB", "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html" }, { "type": "WEB", "url": "http://www.ibm.com/support/docview.wss?uid=swg24029497" }, { "type": "WEB", "url": "http://www.ibm.com/support/docview.wss?uid=swg24029498" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:054" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0210.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0211.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0212.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0213.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0214.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0282.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0333.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0334.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html" }, { "type": "WEB", "url": "http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" } ], "schema_version": "1.4.0", "severity": [], "summary": "Apache Tomcat affected by infinite loop in Double.parseDouble method in Java Runtime Environment" }
var-201102-0280
Vulnerability from variot
The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308. IBM WebSphere Application Server (WAS) contains a denial-of-service (DoS) vulnerability. IBM WebSphere Application Server contains a denial-of-service (DoS) vulnerability due to an issue in Java Runtime Environment (JRE). According to the developer: " For other IBM software products that contain an affected version of WAS, require an update. Specifically, WebSphere Process Server (WPS), WebSphere Enterprise Service Bus (WESB), WebSphere Virtual Enterprise (WVE), WebSphere Commerce and others are applicable. Also, IBM HTTP Server is not affected by this vulnerability."A remote attacker may cause a denial-of-service (DoS). plural Oracle Product Java Runtime Environment Components include Java language and APIs There are vulnerabilities that affect availability due to flaws in the handling of.Service disruption by a third party (DoS) An attack may be carried out. Oracle Java is prone to a remote denial-of-service vulnerability. Successful attacks will cause applications written in Java to hang, creating a denial-of-service condition. This issue affects both the Java compiler and Runtime Environment. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201111-02
http://security.gentoo.org/
Severity: Normal Title: Oracle JRE/JDK: Multiple vulnerabilities Date: November 05, 2011 Bugs: #340421, #354213, #370559, #387851 ID: 201111-02
Synopsis
Multiple vulnerabilities have been found in the Oracle JRE/JDK, allowing attackers to cause unspecified impact.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-java/sun-jre-bin < 1.6.0.29 >= 1.6.0.29 * 2 app-emulation/emul-linux-x86-java < 1.6.0.29 >= 1.6.0.29 * 3 dev-java/sun-jdk < 1.6.0.29 >= 1.6.0.29 * ------------------------------------------------------------------- NOTE: Packages marked with asterisks require manual intervention! ------------------------------------------------------------------- 3 affected packages -------------------------------------------------------------------
Description
Multiple vulnerabilities have been reported in the Oracle Java implementation. Please review the CVE identifiers referenced below and the associated Oracle Critical Patch Update Advisory for details.
Impact
A remote attacker could exploit these vulnerabilities to cause unspecified impact, possibly including remote execution of arbitrary code.
Workaround
There is no known workaround at this time.
Resolution
All Oracle JDK 1.6 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.6.0.29"
All Oracle JRE 1.6 users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.6.0.29"
All users of the precompiled 32-bit Oracle JRE 1.6 should upgrade to the latest version:
# emerge --sync # emerge -a -1 -v ">=app-emulation/emul-linux-x86-java-1.6.0.29"
NOTE: As Oracle has revoked the DLJ license for its Java implementation, the packages can no longer be updated automatically. This limitation is not present on a non-fetch restricted implementation such as dev-java/icedtea-bin.
References
[ 1 ] CVE-2010-3541 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3541 [ 2 ] CVE-2010-3548 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3548 [ 3 ] CVE-2010-3549 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3549 [ 4 ] CVE-2010-3550 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3550 [ 5 ] CVE-2010-3551 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3551 [ 6 ] CVE-2010-3552 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3552 [ 7 ] CVE-2010-3553 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3553 [ 8 ] CVE-2010-3554 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3554 [ 9 ] CVE-2010-3555 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3555 [ 10 ] CVE-2010-3556 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3556 [ 11 ] CVE-2010-3557 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3557 [ 12 ] CVE-2010-3558 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3558 [ 13 ] CVE-2010-3559 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3559 [ 14 ] CVE-2010-3560 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3560 [ 15 ] CVE-2010-3561 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3561 [ 16 ] CVE-2010-3562 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3562 [ 17 ] CVE-2010-3563 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3563 [ 18 ] CVE-2010-3565 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3565 [ 19 ] CVE-2010-3566 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3566 [ 20 ] CVE-2010-3567 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3567 [ 21 ] CVE-2010-3568 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3568 [ 22 ] CVE-2010-3569 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3569 [ 23 ] CVE-2010-3570 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3570 [ 24 ] CVE-2010-3571 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3571 [ 25 ] CVE-2010-3572 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3572 [ 26 ] CVE-2010-3573 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3573 [ 27 ] CVE-2010-3574 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3574 [ 28 ] CVE-2010-4422 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4422 [ 29 ] CVE-2010-4447 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4447 [ 30 ] CVE-2010-4448 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4448 [ 31 ] CVE-2010-4450 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4450 [ 32 ] CVE-2010-4451 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4451 [ 33 ] CVE-2010-4452 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4452 [ 34 ] CVE-2010-4454 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4454 [ 35 ] CVE-2010-4462 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4462 [ 36 ] CVE-2010-4463 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4463 [ 37 ] CVE-2010-4465 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4465 [ 38 ] CVE-2010-4466 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4466 [ 39 ] CVE-2010-4467 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4467 [ 40 ] CVE-2010-4468 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4468 [ 41 ] CVE-2010-4469 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4469 [ 42 ] CVE-2010-4470 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4470 [ 43 ] CVE-2010-4471 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4471 [ 44 ] CVE-2010-4472 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4472 [ 45 ] CVE-2010-4473 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4473 [ 46 ] CVE-2010-4474 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4474 [ 47 ] CVE-2010-4475 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4475 [ 48 ] CVE-2010-4476 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4476 [ 49 ] CVE-2011-0802 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0802 [ 50 ] CVE-2011-0814 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0814 [ 51 ] CVE-2011-0815 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0815 [ 52 ] CVE-2011-0862 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0862 [ 53 ] CVE-2011-0863 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0863 [ 54 ] CVE-2011-0864 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0864 [ 55 ] CVE-2011-0865 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0865 [ 56 ] CVE-2011-0867 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0867 [ 57 ] CVE-2011-0868 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0868 [ 58 ] CVE-2011-0869 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0869 [ 59 ] CVE-2011-0871 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0871 [ 60 ] CVE-2011-0872 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0872 [ 61 ] CVE-2011-0873 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0873 [ 62 ] CVE-2011-3389 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389 [ 63 ] CVE-2011-3516 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3516 [ 64 ] CVE-2011-3521 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3521 [ 65 ] CVE-2011-3544 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3544 [ 66 ] CVE-2011-3545 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3545 [ 67 ] CVE-2011-3546 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3546 [ 68 ] CVE-2011-3547 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3547 [ 69 ] CVE-2011-3548 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3548 [ 70 ] CVE-2011-3549 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3549 [ 71 ] CVE-2011-3550 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3550 [ 72 ] CVE-2011-3551 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3551 [ 73 ] CVE-2011-3552 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3552 [ 74 ] CVE-2011-3553 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3553 [ 75 ] CVE-2011-3554 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3554 [ 76 ] CVE-2011-3555 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3555 [ 77 ] CVE-2011-3556 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3556 [ 78 ] CVE-2011-3557 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3557 [ 79 ] CVE-2011-3558 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3558 [ 80 ] CVE-2011-3560 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3560 [ 81 ] CVE-2011-3561 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3561
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201111-02.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2011 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5 .
Background
IcedTea is a distribution of the Java OpenJDK source code built with free build tools.
NNMi Version / Operating System Required Patch Hotfix
9.1x HP-UX Patch 4 Hotfix-NNMi-9.1xP4-HP-UX-JDK-20120710.zip
9.1x Linux Patch 4 Hotfix-NNMi-9.1xP4-Linux-JDK-20120523.zip
9.1x Solaris Patch 4 Hotfix-NNMi-9.1xP4-Solaris-JDK-20120523.zip
9.1x Windows Patch 4 Hotfix-NNMi-9.1xP4-Windows-JDK-20120523.zip
Note: The hotfix must be installed after the required patch. The hotfix must be reinstalled if the required patch is reinstalled.
MANUAL ACTIONS: Yes - Update
Install the applicable patch and hotfix. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com. Summary:
Updated java-1.6.0-ibm packages that fix several security issues are now available for Red Hat Network Satellite 5.4.1 for Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having low security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
- Relevant releases/architectures:
Red Hat Network Satellite Server 5.4 (RHEL v.5) - i386, s390x, x86_64
- In a typical operating environment, these are of low security risk as the runtime is not used on untrusted applets. Detailed vulnerability descriptions are linked from the IBM "Security alerts" page, listed in the References section. (CVE-2009-3555, CVE-2010-1321, CVE-2010-3541, CVE-2010-3548, CVE-2010-3549, CVE-2010-3550, CVE-2010-3551, CVE-2010-3553, CVE-2010-3555, CVE-2010-3556, CVE-2010-3557, CVE-2010-3558, CVE-2010-3560, CVE-2010-3562, CVE-2010-3563, CVE-2010-3565, CVE-2010-3566, CVE-2010-3568, CVE-2010-3569, CVE-2010-3571, CVE-2010-3572, CVE-2010-3573, CVE-2010-3574, CVE-2010-4422, CVE-2010-4447, CVE-2010-4448, CVE-2010-4452, CVE-2010-4454, CVE-2010-4462, CVE-2010-4463, CVE-2010-4465, CVE-2010-4466, CVE-2010-4467, CVE-2010-4468, CVE-2010-4471, CVE-2010-4473, CVE-2010-4475, CVE-2010-4476)
Users of Red Hat Network Satellite 5.4.1 are advised to upgrade to these updated java-1.6.0-ibm packages, which contain the IBM 1.6.0 SR9-FP1 Java release. For this update to take effect, Red Hat Network Satellite must be restarted. Refer to the Solution section for details.
- Solution:
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259
Run the following command to restart the Red Hat Network Satellite server:
rhn-satellite restart
- Bugs fixed (http://bugzilla.redhat.com/):
533125 - CVE-2009-3555 TLS: MITM attacks via session renegotiation 582466 - CVE-2010-1321 krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005) 639876 - CVE-2010-3568 OpenJDK Deserialization Race condition (6559775) 639897 - CVE-2010-3562 OpenJDK IndexColorModel double-free (6925710) 639904 - CVE-2010-3557 OpenJDK Swing mutable static (6938813) 639909 - CVE-2010-3548 OpenJDK DNS server IP address information leak (6957564) 639920 - CVE-2010-3565 OpenJDK JPEG writeImage remote code execution (6963023) 639922 - CVE-2010-3566 OpenJDK ICC Profile remote code execution (6963489) 639925 - CVE-2010-3569 OpenJDK Serialization inconsistencies (6966692) 642167 - CVE-2010-3553 OpenJDK Swing unsafe reflection usage (6622002) 642180 - CVE-2010-3549 OpenJDK HttpURLConnection request splitting (6952017) 642187 - CVE-2010-3551 OpenJDK local network address disclosure (6952603) 642202 - CVE-2010-3541 CVE-2010-3573 OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004) 642215 - CVE-2010-3574 OpenJDK HttpURLConnection incomplete TRACE permission check (6981426) 642558 - CVE-2010-3555 JDK unspecified vulnerability in Deployment component 642559 - CVE-2010-3550 JDK unspecified vulnerability in Java Web Start component 642573 - CVE-2010-3560 JDK unspecified vulnerability in Networking component 642576 - CVE-2010-3556 JDK unspecified vulnerability in 2D component 642585 - CVE-2010-3571 JDK unspecified vulnerability in 2D component 642589 - CVE-2010-3563 JDK unspecified vulnerability in Deployment component 642593 - CVE-2010-3558 JDK unspecified vulnerability in Java Web Start component 642611 - CVE-2010-3572 JDK unspecified vulnerability in Sound component 674336 - CVE-2010-4476 JDK Double.parseDouble Denial-Of-Service 675984 - CVE-2010-4465 OpenJDK Swing timer-based security manager bypass (6907662) 676019 - CVE-2010-4471 OpenJDK Java2D font-related system property leak (6985453) 676023 - CVE-2010-4448 OpenJDK DNS cache poisoning by untrusted applets (6981922) 677957 - CVE-2010-4475 JDK unspecified vulnerability in Deployment component 677958 - CVE-2010-4473 JDK unspecified vulnerability in Sound component 677959 - CVE-2010-4468 JDK unspecified vulnerability in JDBC component 677960 - CVE-2010-4467 JDK unspecified vulnerability in Deployment component 677961 - CVE-2010-4466 JDK unspecified vulnerability in Deployment component 677963 - CVE-2010-4463 JDK unspecified vulnerability in Deployment component 677966 - CVE-2010-4462 JDK unspecified vulnerability in Sound component 677967 - CVE-2010-4454 JDK unspecified vulnerability in Sound component 677968 - CVE-2010-4452 JDK unspecified vulnerability in Deployment component 677970 - CVE-2010-4447 JDK unspecified vulnerability in Deployment component 677971 - CVE-2010-4422 JDK unspecified vulnerability in Deployment component
- Package List:
Red Hat Network Satellite Server 5.4 (RHEL v.5):
Source: ftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHNSAT/SRPMS/java-1.6.0-ibm-1.6.0.9.1-1jpp.1.el5.src.rpm
i386: java-1.6.0-ibm-1.6.0.9.1-1jpp.1.el5.i386.rpm java-1.6.0-ibm-devel-1.6.0.9.1-1jpp.1.el5.i386.rpm
s390x: java-1.6.0-ibm-1.6.0.9.1-1jpp.1.el5.s390x.rpm java-1.6.0-ibm-devel-1.6.0.9.1-1jpp.1.el5.s390x.rpm
x86_64: java-1.6.0-ibm-1.6.0.9.1-1jpp.1.el5.x86_64.rpm java-1.6.0-ibm-devel-1.6.0.9.1-1jpp.1.el5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2009-3555.html https://www.redhat.com/security/data/cve/CVE-2010-1321.html https://www.redhat.com/security/data/cve/CVE-2010-3541.html https://www.redhat.com/security/data/cve/CVE-2010-3548.html https://www.redhat.com/security/data/cve/CVE-2010-3549.html https://www.redhat.com/security/data/cve/CVE-2010-3550.html https://www.redhat.com/security/data/cve/CVE-2010-3551.html https://www.redhat.com/security/data/cve/CVE-2010-3553.html https://www.redhat.com/security/data/cve/CVE-2010-3555.html https://www.redhat.com/security/data/cve/CVE-2010-3556.html https://www.redhat.com/security/data/cve/CVE-2010-3557.html https://www.redhat.com/security/data/cve/CVE-2010-3558.html https://www.redhat.com/security/data/cve/CVE-2010-3560.html https://www.redhat.com/security/data/cve/CVE-2010-3562.html https://www.redhat.com/security/data/cve/CVE-2010-3563.html https://www.redhat.com/security/data/cve/CVE-2010-3565.html https://www.redhat.com/security/data/cve/CVE-2010-3566.html https://www.redhat.com/security/data/cve/CVE-2010-3568.html https://www.redhat.com/security/data/cve/CVE-2010-3569.html https://www.redhat.com/security/data/cve/CVE-2010-3571.html https://www.redhat.com/security/data/cve/CVE-2010-3572.html https://www.redhat.com/security/data/cve/CVE-2010-3573.html https://www.redhat.com/security/data/cve/CVE-2010-3574.html https://www.redhat.com/security/data/cve/CVE-2010-4422.html https://www.redhat.com/security/data/cve/CVE-2010-4447.html https://www.redhat.com/security/data/cve/CVE-2010-4448.html https://www.redhat.com/security/data/cve/CVE-2010-4452.html https://www.redhat.com/security/data/cve/CVE-2010-4454.html https://www.redhat.com/security/data/cve/CVE-2010-4462.html https://www.redhat.com/security/data/cve/CVE-2010-4463.html https://www.redhat.com/security/data/cve/CVE-2010-4465.html https://www.redhat.com/security/data/cve/CVE-2010-4466.html https://www.redhat.com/security/data/cve/CVE-2010-4467.html https://www.redhat.com/security/data/cve/CVE-2010-4468.html https://www.redhat.com/security/data/cve/CVE-2010-4471.html https://www.redhat.com/security/data/cve/CVE-2010-4473.html https://www.redhat.com/security/data/cve/CVE-2010-4475.html https://www.redhat.com/security/data/cve/CVE-2010-4476.html https://access.redhat.com/security/updates/classification/#low http://www.ibm.com/developerworks/java/jdk/alerts/
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2011 Red Hat, Inc.
For more information see vulnerability #1 in: SA43262
Please see the vendor's advisory for the list of affected products.
SOLUTION: Update to a fixed version. Please see the vendor's advisory for more details. ----------------------------------------------------------------------
Get a tax break on purchases of Secunia Solutions!
If you are a U.S. company, you may be qualified for a tax break for your software purchases. Learn more at: http://secunia.com/products/corporate/vim/section_179/
TITLE: Sun Java JDK / JRE / SDK "doubleValue()" Denial of Service Vulnerability
SECUNIA ADVISORY ID: SA43262
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/43262/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=43262
RELEASE DATE: 2011-02-09
DISCUSS ADVISORY: http://secunia.com/advisories/43262/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/43262/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=43262
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Konstantin Preiber has reported a vulnerability in Sun Java, which can be exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an error in the "doubleValue()" method in FloatingDecimal.java when converting "2.2250738585072012e-308" from a string type to a double precision binary floating point and can be exploited to cause an infinite loop. * Sun JDK 5.0 Update 27 and prior. * Sun SDK 1.4.2_29 and prior.
SOLUTION: Apply patch via the FPUpdater tool.
PROVIDED AND/OR DISCOVERED BY: Konstantin Preiber
ORIGINAL ADVISORY: Oracle: http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html
Konstantin Preiber: http://www.exploringbinary.com/why-volatile-fixes-the-2-2250738585072011e-308-bug/comment-page-1/#comment-4645
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c02746026 Version: 1
HPSBUX02642 SSRT100415 rev.1 - HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows running Java, Remote Denial of Service (DoS)
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2011-04-12 Last Updated: 2011-04-12
Potential Security Impact: Remote Denial of Service (DoS)
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY A potential vulnerability has been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows running Java. The vulnerability could be remotely exploited to create a Denial of Service (DoS).
References: CVE-2010-4476
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Any version of Java running on HP Network Node Manager i (NNMi) v8.1x and v9.0x for HP-UX, Linux, Solaris, and Windows
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2010-4476 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has made two methods available to resolve the vulnerability. Customers can request hotfixes or use the FPupdater tool.
Hotfixes
Customers can request the following hotfixes by contacting the normal HP Services support channel.
NNMi Version JDK Hotfix Number
NNMi 9.0x JDK b QCCR1B87492
NNMi 9.0x JDK nnm QCCR1B87433
NNMi 8.1x JDK b QCCR1B87492
NNMi 8.1x JDK nnm (nms on Windows) QCCR1B87491
FPUpdater (Floating Point Updater)
The FPupdater tool can be used instead of applying hotfixes.
To download the FPUpdater tool, go to https://www.hp.com/go/java then click on the link for the FPUpdater tool
Note: NNMi has two JDKs to be updated. Before running the FPUpdater tool set the shell environment variable JRE_HOME as follows:
NNMi Version JDK JRE_HOME for HP-UX, Linux, Solaris JRE_HOME for Windows
NNMi 9.x JDK b /opt/OV/nonOV/jdk/b/jre {install_dir}\nonOV\jdk\b\jre
NNMi 9.x JDK nnm /opt/OV/nonOV/jdk/nnm/jre {install_dir}\nonOV\jdk\nnm\jre
NNMi 8.1x JDK b /opt/OV/nonOV/jdk/b/jre {install_dir}\nonOV\jdk\b\jre
NNMi 8.1x JDK nnm (nms on Windows) /opt/OV/nonOV/jdk/nnm/jre {install_dir}\nonOV\jdk\nms\jre
MANUAL ACTIONS: Yes - Update
Install the appropriate hotfix or update using FPUpdater
PRODUCT SPECIFIC INFORMATION
HP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa
The following text is for use by the HP-UX Software Assistant.
AFFECTED VERSIONS (for HP-UX)
For HP-UX NNM 8.x and v9.x
HP-UX B.11.31 HP-UX B.11.23 (IA) ============= HPOvNNM.HPNMSJBOSS action: install the appropriate hotfix or update using FPUpdater
END AFFECTED VERSIONS (for HP-UX)
HISTORY Version:1 (rev.1) - 12 April 2011 Initial release
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For further information, contact normal HP Services support channel.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To get the security-alert PGP key, please send an e-mail message as follows: To: security-alert@hp.com Subject: get key Subscribe: To initiate a subscription to receive future HP Security Bulletins via Email: http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA&langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC On the web page: ITRC security bulletins and patch sign-up Under Step1: your ITRC security bulletins and patches -check ALL categories for which alerts are required and continue. Under Step2: your ITRC operating systems -verify your operating system selections are checked and save.
To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php Log in on the web page: Subscriber's choice for Business: sign-in. On the web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections.
To review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do
- The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number in the title:
GN = HP General SW MA = HP Management Agents MI = Misc. 3rd Party SW MP = HP MPE/iX NS = HP NonStop Servers OV = HP OpenVMS PI = HP Printing & Imaging ST = HP Storage SW TL = HP Trusted Linux TU = HP Tru64 UNIX UX = HP-UX VV = HP VirtualVault
System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."
Copyright 2009 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAk2kX5sACgkQ4B86/C0qfVnGRwCgot7NFjfw2O2zBn2uPX3Q/SVW AewAoNWFcOq802uOl0MpL1CHVvxYZMNf =g6I8 -----END PGP SIGNATURE----- . The updates are available from: http://www.hp.com/go/java
These issues are addressed in the following versions of the HP Java:
HP-UX B.11.11 / SDK and JRE v1.4.2.28 or subsequent
HP-UX B.11.23 / SDK and JRE v1.4.2.28 or subsequent
HP-UX B.11.31 / SDK and JRE v1.4.2.28 or subsequent
MANUAL ACTIONS: Yes - Update
For Java v1.4.2.27 and earlier, update to Java v1.4.2.28 or subsequent
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201102-0280", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "cosminexus application server enterprise 06-50-/a", "scope": null, "trust": 2.1, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server enterprise 06-00-/a", "scope": null, "trust": 2.1, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server standard 06-50-/b", "scope": null, "trust": 2.1, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server enterprise 06-70-/b", "scope": null, "trust": 2.1, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server standard 06-50-/a", "scope": null, "trust": 2.1, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server enterprise 06-70-/c", "scope": null, "trust": 2.1, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server standard 06-70-/b", "scope": null, "trust": 2.1, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server standard 06-70-/c", "scope": null, "trust": 2.1, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server enterprise 06-50-/b", "scope": null, "trust": 2.1, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server standard 06-00-/a", "scope": null, "trust": 2.1, "vendor": "hitachi", "version": null }, { "model": "jre", "scope": "eq", "trust": 1.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk", "scope": "eq", "trust": 1.9, "vendor": "sun", "version": "1.4.2" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 1.8, "vendor": "hitachi", "version": "08-00-01" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 1.8, "vendor": "hitachi", "version": "08-00-01" }, { "model": "cosminexus application server standard 06-50-/c", "scope": null, "trust": 1.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 1.8, "vendor": "hitachi", "version": "08-00-01" }, { "model": "ucosminexus application server standard 06-70-/a", "scope": null, "trust": 1.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server enterprise 06-70-/f", "scope": null, "trust": 1.8, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server enterprise 06-00-/b", "scope": null, "trust": 1.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 1.8, "vendor": "hitachi", "version": "07-10" }, { "model": "cosminexus application server standard 06-00-/b", "scope": null, "trust": 1.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus client", "scope": "eq", "trust": 1.8, "vendor": "hitachi", "version": "08-00-01" }, { "model": "cosminexus application server enterprise 06-50-/c", "scope": null, "trust": 1.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server enterprise 06-70-/a", "scope": null, "trust": 1.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server standard 06-70-/f", "scope": null, "trust": 1.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 1.8, "vendor": "hitachi", "version": "08-00-01" }, { "model": "hp systems insight manager", "scope": "eq", "trust": 1.6, "vendor": "hewlett packard l p", "version": "prior to v7.0" }, { "model": "cosminexus application server standard", "scope": "eq", "trust": 1.5, "vendor": "hitachi", "version": "06-50" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 1.5, "vendor": "hitachi", "version": "07-10" }, { "model": "ucosminexus application server standard 06-70-/d", "scope": null, "trust": 1.5, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server standard 06-70-/g", "scope": null, "trust": 1.5, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 1.5, "vendor": "hitachi", "version": "06-70" }, { "model": "cosminexus application server enterprise 06-00-/c", "scope": null, "trust": 1.5, "vendor": "hitachi", "version": null }, { "model": "jre 011", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "cosminexus application server standard 06-00-/e", "scope": null, "trust": 1.5, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server enterprise", "scope": "eq", "trust": 1.5, "vendor": "hitachi", "version": "06-00" }, { "model": "ucosminexus application server standard 06-70-/e", "scope": null, "trust": 1.5, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server standard 06-00-/d", "scope": null, "trust": 1.5, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server standard 06-50-/e", "scope": null, "trust": 1.5, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server enterprise 06-00-/e", "scope": null, "trust": 1.5, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server enterprise 06-50-/e", "scope": null, "trust": 1.5, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server standard", "scope": "eq", "trust": 1.5, "vendor": "hitachi", "version": "06-00" }, { "model": "ucosminexus application server enterprise 06-70-/e", "scope": null, "trust": 1.5, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server standard 06-00-/c", "scope": null, "trust": 1.5, "vendor": "hitachi", "version": null }, { "model": "jre 010", "scope": "eq", "trust": 1.5, "vendor": "sun", "version": "1.2.2" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 1.5, "vendor": "hitachi", "version": "06-70" }, { "model": "cosminexus application server enterprise", "scope": "eq", "trust": 1.5, "vendor": "hitachi", "version": "06-50" }, { "model": "ucosminexus application server enterprise 06-70-/d", "scope": null, "trust": 1.5, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server enterprise 06-00-/d", "scope": null, "trust": 1.5, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 1.2, "vendor": "hitachi", "version": "07-00" }, { "model": "cosminexus application server 05-05-/i", "scope": null, "trust": 1.2, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server", "scope": "eq", "trust": 1.2, "vendor": "hitachi", "version": "05-05" }, { "model": "ucosminexus client", "scope": "eq", "trust": 1.2, "vendor": "hitachi", "version": "07-00-06" }, { "model": "cosminexus application server 05-05-/d", "scope": null, "trust": 1.2, "vendor": "hitachi", "version": null }, { "model": "jre 013", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "cosminexus application server 05-05-/h", "scope": null, "trust": 1.2, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 1.2, "vendor": "hitachi", "version": "07-00-06" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 1.2, "vendor": "hitachi", "version": "07-60" }, { "model": "jp1/cm2/network node manager starter edition", "scope": "eq", "trust": 1.2, "vendor": "hitachi", "version": "25008-10-01" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 1.2, "vendor": "hitachi", "version": "07-00-06" }, { "model": "ucosminexus application server enterprise 06-70-/g", "scope": null, "trust": 1.2, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 1.2, "vendor": "hitachi", "version": "07-00-06" }, { "model": "cosminexus application server 05-05-/f", "scope": null, "trust": 1.2, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server standard 06-50-/d", "scope": null, "trust": 1.2, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 1.2, "vendor": "hitachi", "version": "08-00" }, { "model": "cosminexus application server 05-05-/a", "scope": null, "trust": 1.2, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server 05-05-/e", "scope": null, "trust": 1.2, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 1.2, "vendor": "hitachi", "version": "07-00-06" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 1.2, "vendor": "hitachi", "version": "07-00-06" }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 1.2, "vendor": "hitachi", "version": "07-60" }, { "model": "cosminexus application server 05-05-/g", "scope": null, "trust": 1.2, "vendor": "hitachi", "version": null }, { "model": "ucosminexus operator", "scope": "eq", "trust": 1.2, "vendor": "hitachi", "version": "07-00-06" }, { "model": "jre 014", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 1.2, "vendor": "hitachi", "version": "07-00-06" }, { "model": "jre", "scope": "eq", "trust": 1.2, "vendor": "sun", "version": "1.2.2" }, { "model": "cosminexus application server 05-05-/b", "scope": null, "trust": 1.2, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server 05-05-/c", "scope": null, "trust": 1.2, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server enterprise 06-50-/d", "scope": null, "trust": 1.2, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 1.2, "vendor": "hitachi", "version": "08-00" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 1.2, "vendor": "hitachi", "version": "07-00" }, { "model": "esx", "scope": "eq", "trust": 1.1, "vendor": "vmware", "version": "4.0" }, { "model": "esx", "scope": "eq", "trust": 1.1, "vendor": "vmware", "version": "4.1" }, { "model": "esx", "scope": "eq", "trust": 1.1, "vendor": "vmware", "version": "3.5" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_15" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_18" }, { "model": "jdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.6.0" }, { "model": "jdk", "scope": "lte", "trust": 1.0, "vendor": "sun", "version": "1.5.0" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_6" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_15" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_16" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_28" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_19" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_22" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_21" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_6" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_3" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_25" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_28" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_16" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_22" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_20" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_21" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_25" }, { "model": "jre", "scope": "lte", "trust": 1.0, "vendor": "sun", "version": "1.6.0" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_19" }, { "model": "jre", "scope": "lte", "trust": 1.0, "vendor": "sun", "version": "1.4.2_29" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_7" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_3" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_2" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_24" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_14" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_5" }, { "model": "sdk", "scope": "lte", "trust": 1.0, "vendor": "sun", "version": "1.4.2_29" }, { "model": "jdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.5.0" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_20" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_24" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_9" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_23" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_7" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_14" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_11" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_23" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_26" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_5" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_9" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_4" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_11" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_26" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_13" }, { "model": "jre", "scope": "lte", "trust": 1.0, "vendor": "sun", "version": "1.5.0" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_1" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_4" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_17" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_02" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_1" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_17" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_8" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_10" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_13" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.6.0" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_27" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_10" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_12" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_8" }, { "model": "jdk", "scope": "lte", "trust": 1.0, "vendor": "sun", "version": "1.6.0" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_27" }, { "model": "sdk", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_12" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.5.0" }, { "model": "jre", "scope": "eq", "trust": 1.0, "vendor": "sun", "version": "1.4.2_18" }, { "model": "jre 17", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "sdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 1.3.1 22", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jp1/cm2/network node manager starter ed enterprise", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "08-00-02" }, { "model": "jdk 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "cosminexus application server enterprise )", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "06-00" }, { "model": "jdk 1.5.0 16", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "sdk 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": "sdk 1.4.2 25", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.4.2 25", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "ucosminexus application server enterprise 06-71-/b", "scope": null, "trust": 0.9, "vendor": "hitachi", "version": null }, { "model": "jre 015", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "cosminexus application server standard 06-02-/a", "scope": null, "trust": 0.9, "vendor": "hitachi", "version": null }, { "model": "jre 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jdk 1.6.0 03", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 1.4.2 11", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "cosminexus application server standard 06-51-/a", "scope": null, "trust": 0.9, "vendor": "hitachi", "version": null }, { "model": "jre 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.1" }, { "model": "jdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jdk 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 27", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "07-00-03" }, { "model": "jre 1.5.0 11", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "cosminexus application server enterprise 06-02-/d", "scope": null, "trust": 0.9, "vendor": "hitachi", "version": null }, { "model": "jdk 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.6" }, { "model": "jre 1.4.2 12", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2" }, { "model": "sdk 24", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 01a", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 1.4.2 22", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 1.6.0 23", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "sdk 1.4.2 27", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 15", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "sdk 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "07-60" }, { "model": "jre .0 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "processing kit for xml", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "01-05" }, { "model": "jdk 1.5.0 25", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "cosminexus application server enterprise 06-02-/c", "scope": null, "trust": 0.9, "vendor": "hitachi", "version": null }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 1.6.0 11", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "07-50-01" }, { "model": "jre 1.5.0 17", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.4.2 17", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 24", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 1.5.0 27", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.3.1 23", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk b 005", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.7" }, { "model": "jre 1.6.0 03", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "processing kit for xml 02-05-/a", "scope": null, "trust": 0.9, "vendor": "hitachi", "version": null }, { "model": "jdk 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "cosminexus application server standard )", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "06-00" }, { "model": "cosminexus application server enterprise 06-50-/f", "scope": null, "trust": 0.9, "vendor": "hitachi", "version": null }, { "model": "sdk 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "cosminexus application server enterprise 06-51-/a", "scope": null, "trust": 0.9, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server enterprise 06-71-/c", "scope": null, "trust": 0.9, "vendor": "hitachi", "version": null }, { "model": "jre 1.4.2 13", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jdk 1.5.0 23", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 1.3.1 25", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk 1.5.0 26", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jp1/cm2/network node manager starter ed enterprise", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "08-10-01" }, { "model": "sdk 1.4.2 16", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "processing kit for xml 02-05-/b", "scope": null, "trust": 0.9, "vendor": "hitachi", "version": null }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "07-50" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "07-10" }, { "model": "jre 16", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 1.5.0 20", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.3.1 26", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 18", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk 11", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre .0 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk .0 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 1.4.2 11", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1" }, { "model": "cosminexus application server standard 06-02-/d", "scope": null, "trust": 0.9, "vendor": "hitachi", "version": null }, { "model": "jdk 0 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 1.5.0 10", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "cosminexus application server enterprise 06-02-/a", "scope": null, "trust": 0.9, "vendor": "hitachi", "version": null }, { "model": "jdk 1.5.0 27", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "sdk 1.4.2 29", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk 1.4.2 14", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.5.0 14", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.4.2 20", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "ucosminexus application server standard )", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "06-70" }, { "model": "jdk 1.5.0 24", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 18", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 1.5.0 25", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk .0 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "07-00-03" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "cosminexus application server standard 06-02-/c", "scope": null, "trust": 0.9, "vendor": "hitachi", "version": null }, { "model": "jdk 1.5.0 13", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jp1/cm2/network node manager", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "07-10" }, { "model": "jre 1.4.2 16", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 1.4.2 17", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.6.0 15", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "cosminexus application server", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "05-00" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 1.6.0 21", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 15", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 10", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 1.6.0 18", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 1.6.0 22", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "jp1/cm2/network node manager starter edition", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "25008-00-02" }, { "model": "jdk 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "sdk .0 4", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk 1.4.2 28", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 21", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "cosminexus application server standard 06-02-/b", "scope": null, "trust": 0.9, "vendor": "hitachi", "version": null }, { "model": "jdk 1.6.0 15", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "sdk 1.4.2 12", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.4.2 18", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.4.2 14", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "processing kit for xml", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "02-00" }, { "model": "jre 1.6.0 02", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "cosminexus application server standard 06-50-/f", "scope": null, "trust": 0.9, "vendor": "hitachi", "version": null }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.1" }, { "model": "jre 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 1.4.2 15", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "cosminexus application server enterprise 06-02-/b", "scope": null, "trust": 0.9, "vendor": "hitachi", "version": null }, { "model": "jre 15", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jdk 17", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 1.4.2 26", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jp1/cm2/network node manager starter ed enterprise", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "08-00-01" }, { "model": "jre 1.4.2 29", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 01", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jdk 17", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "07-00-03" }, { "model": "jre .0 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jre 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "sdk 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "cosminexus application server 05-05-/m", "scope": null, "trust": 0.9, "vendor": "hitachi", "version": null }, { "model": "jre 1.5.0 26", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 1.4.2 18", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "cosminexus server web edition", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "-04-01" }, { "model": "jdk 008", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 1.3.1 20", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 17", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jdk 18", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "sdk 1.4.2 22", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk", "scope": "eq", "trust": 0.9, "vendor": "oracle", "version": "1.7" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "07-00-01" }, { "model": "jre 08", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2" }, { "model": "jdk 1.6.0 02", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jre 1.6.0 01", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 12", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "07-00-03" }, { "model": "jdk 07", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "sdk 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "07-50" }, { "model": "ucosminexus application server enterprise )", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "06-70" }, { "model": "jdk 14", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 02", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "sdk 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 03", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 1.3.1 21", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk 1.4.2 19", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 1.5.0 12", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "sdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4" }, { "model": "jdk 13", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 1.5.0 13", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 22", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jre 1.4.2 19", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre .0 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3" }, { "model": "jre 05", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk 1.6.0 23", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "sdk 1.4.2 20", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 20", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 04", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 1.6.0 19", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "07-50" }, { "model": "jdk 1.5.0 20", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.4.1" }, { "model": "jre 1.5.0 23", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.3.1" }, { "model": "cosminexus application server standard 06-51-/b", "scope": null, "trust": 0.9, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "07-50-01" }, { "model": "jdk 1.6.0 22", "scope": null, "trust": 0.9, "vendor": "oracle", "version": null }, { "model": "sdk 1.4.2 13", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 06", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.6" }, { "model": "jre 09", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.6" }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.9, "vendor": "hitachi", "version": "07-00-01" }, { "model": "jdk 1.6.0 18", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 19", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "cosminexus application server enterprise 06-51-/b", "scope": null, "trust": 0.9, "vendor": "hitachi", "version": null }, { "model": "jre 007", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.2.2" }, { "model": "jre 1.6.0 14", "scope": null, "trust": 0.9, "vendor": "sun", "version": null }, { "model": "jre 22", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.5" }, { "model": "jdk 009", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "1.1.8" }, { "model": "forms", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "4.0, 3.5" }, { "model": "lotus expeditor", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "6.2" }, { "model": "lotus quickr", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "for websphere portal 8.5, 8.1, 8.0" }, { "model": "mashup center", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "3.0, 2.0, 1.1, 1.0" }, { "model": "websphere dashboard framework", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "6.1, 6.0" }, { "model": "lotus activeinsight", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "6.1, 6.0" }, { "model": "lotus connections", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "3.0, 2.5, 2.0, 1.0" }, { "model": "lotus mashups", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "3.0, 2.0, 1.1, 1.0" }, { "model": "lotus sametime advanced", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "8.0" }, { "model": "lotus sametime standard", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "8.5" }, { "model": "lotus sametime unified telephony", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "8.5.1, 8.0" }, { "model": "lotus web content management", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "7.0, 6.1" }, { "model": "lotus workforce management", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "6.1" }, { "model": "websphere portlet factory", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "7.0, 6.1" }, { "model": "workplace web content management", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "6.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "to v6.0 to v6.0.2.43" }, { "model": "websphere application server", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "to v6.1 to v6.1.0.35" }, { "model": "websphere application server", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "to v7.0 to v7.0.0.13" }, { "model": "websphere application server", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "v6.0 to v6.0.2.43" }, { "model": "websphere application server", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "v6.1 to v6.1.0.35" }, { "model": "websphere application server", "scope": "eq", "trust": 0.8, "vendor": "ibm", "version": "v7.0 to v7.0.0.13" }, { "model": "esx", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "3.0.3" }, { "model": "esxi", "scope": null, "trust": 0.8, "vendor": "vmware", "version": null }, { "model": "vcenter", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "4.0 (windows)" }, { "model": "vcenter", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "4.1 (windows)" }, { "model": "vcenter", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "5.0 (windows)" }, { "model": "virtualcenter", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "2.5 (windows)" }, { "model": "vsphere update manager", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "4.0 (windows)" }, { "model": "vsphere update manager", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "4.1 (windows)" }, { "model": "vsphere update manager", "scope": "eq", "trust": 0.8, "vendor": "vmware", "version": "5.0 (windows)" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.5.8" }, { "model": "mac os x", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.6.6" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.5.8" }, { "model": "mac os x server", "scope": "eq", "trust": 0.8, "vendor": "apple", "version": "v10.6.6" }, { "model": "iplanet web server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "6.1" }, { "model": "iplanet web server", "scope": "eq", "trust": 0.8, "vendor": "oracle", "version": "7.0" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86)" }, { "model": "asianux server", "scope": "eq", "trust": 0.8, "vendor": "cybertrust", "version": "3 (x86-64)" }, { "model": "jdk", "scope": "lte", "trust": 0.8, "vendor": "sun microsystems", "version": "5.0 update 27" }, { "model": "jdk", "scope": "lte", "trust": 0.8, "vendor": "sun microsystems", "version": "6 update 23" }, { "model": "jre", "scope": "lte", "trust": 0.8, "vendor": "sun microsystems", "version": "1.4.2_29" }, { "model": "jre", "scope": "lte", "trust": 0.8, "vendor": "sun microsystems", "version": "5.0 update 27" }, { "model": "jre", "scope": "lte", "trust": 0.8, "vendor": "sun microsystems", "version": "6 update 23" }, { "model": "sdk", "scope": "lte", "trust": 0.8, "vendor": "sun microsystems", "version": "1.4.2_29" }, { "model": "hp systems insight manager", "scope": "lt", "trust": 0.8, "vendor": "hewlett packard", "version": "7.0" }, { "model": "hp tru64 unix", "scope": "lte", "trust": 0.8, "vendor": "hewlett packard", "version": "running j2se v 1.42-9" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.11" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.23" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.23 (ia)" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.23 (pa)" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.31" }, { "model": "hp-ux tomcat-based servlet engine", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "5.5.30.04" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (server)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5.0 (client)" }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4 extras" }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "4.8.z extras" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6" }, { "model": "enterprise linux hpc node supplementary", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6" }, { "model": "enterprise linux server supplementary", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6" }, { "model": "enterprise linux workstation supplementary", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6" }, { "model": "rhel desktop supplementary", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (client)" }, { "model": "rhel desktop supplementary", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "6" }, { "model": "rhel desktop workstation", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (client)" }, { "model": "rhel supplementary", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "5 (server)" }, { "model": "systemdirector enterprise", "scope": null, "trust": 0.8, "vendor": "nec", "version": null }, { "model": "cosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "enterprise version 6" }, { "model": "cosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "standard version 6" }, { "model": "cosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "version 5" }, { "model": "cosminexus client", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "version 6" }, { "model": "cosminexus collaboration", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- server" }, { "model": "cosminexus developer", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "light version 6" }, { "model": "cosminexus developer", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "professional version 6" }, { "model": "cosminexus developer", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "standard version 6" }, { "model": "cosminexus developer", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "version 5" }, { "model": "cosminexus server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- standard edition version 4" }, { "model": "cosminexus server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- web edition version 4" }, { "model": "cosminexus studio", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- standard edition version 4" }, { "model": "cosminexus studio", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- web edition version 4" }, { "model": "cosminexus studio", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "version 5" }, { "model": "groupmax collaboration", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- server" }, { "model": "hirdb realtime monitor", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "developer\u0027s kit for java", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "device manager", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "software" }, { "model": "global link manager", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "software" }, { "model": "it operations analyzer", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "it operations director", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "provisioning manager", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "software" }, { "model": "replication manager", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "software" }, { "model": "tiered storage manager", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "software" }, { "model": "tuning manager", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "software" }, { "model": "job management partner 1/automatic job management system 2", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- web operation assistant( english edition )" }, { "model": "job management partner 1/automatic job management system 2", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- web operation assistant/ex( english edition )" }, { "model": "job management partner 1/automatic job management system 3", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- web operation assistant( english edition )" }, { "model": "job management partner 1/performance management - web console", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "( overseas edition )" }, { "model": "jp1/automatic job management system 2", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- web operation assistant" }, { "model": "jp1/automatic job management system 3", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- web operation assistant" }, { "model": "jp1/cm2/network node manager", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "none" }, { "model": "jp1/cm2/network node manager", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "i" }, { "model": "jp1/cm2/network node manager", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "i advanced" }, { "model": "jp1/cm2/network node manager", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "starter edition 250" }, { "model": "jp1/cm2/network node manager", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "starter edition enterprise" }, { "model": "jp1/cm2/snmp system observer", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "jp1/hicommand device manager", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "jp1/hicommand global link availability manager", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "jp1/hicommand provisioning manager", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "jp1/hicommand replication monitor", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "jp1/hicommand tiered storage manager", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "jp1/hicommand tuning manager", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "jp1/integrated management", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- service support" }, { "model": "jp1/it resource management", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- manager" }, { "model": "jp1/performance management", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- web console" }, { "model": "jp1/performance management", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- web console( overseas edition )" }, { "model": "jp1/serverconductor/control manager", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "processing kit for xml", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "enterprise" }, { "model": "ucosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "standard" }, { "model": "ucosminexus application server", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "standard-r" }, { "model": "ucosminexus client", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus collaboration", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- server" }, { "model": "ucosminexus developer", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "light" }, { "model": "ucosminexus developer", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "professional" }, { "model": "ucosminexus developer", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "standard" }, { "model": "ucosminexus navigation", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "developer" }, { "model": "ucosminexus navigation", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "platform" }, { "model": "ucosminexus navigation", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "platform - authoring license" }, { "model": "ucosminexus navigation", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "platform - user license" }, { "model": "ucosminexus operator", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus portal framework", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "entry set" }, { "model": "ucosminexus reporting base", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ucosminexus service", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "architect" }, { "model": "ucosminexus service", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "platform" }, { "model": "ucosminexus stream data platform", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "none" }, { "model": "ucosminexus stream data platform", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "- application framework" }, { "model": "electronic form workflow", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "standard set" }, { "model": "electronic form workflow", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "set" }, { "model": "electronic form workflow", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "developer client set" }, { "model": "electronic form workflow", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "developer set" }, { "model": "electronic form workflow", "scope": "eq", "trust": 0.8, "vendor": "hitachi", "version": "professional library set" }, { "model": "internet navigware server", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "interstage application development cycle manager", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "interstage application framework suite", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "interstage application server", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "interstage apworks", "scope": "eq", "trust": 0.8, "vendor": "fujitsu", "version": "server operation package" }, { "model": "interstage business application server", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "interstage job workload server", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "interstage list works", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "interstage service integrator", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "interstage web server", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "interstage xml business activity recorder", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "systemwalker availability view", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "systemwalker centric manager", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "systemwalker it change manager", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "systemwalker it process master", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "systemwalker resource coordinator", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "systemwalker service quality coordinator", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "jre 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "ucosminexus application server enterprise 06-71-/d", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server standard 06-71-/b", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "device manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1.1-03" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-03-02" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1.1-00" }, { "model": "device manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.2-01" }, { "model": "ucosminexus application server enterprise )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-60" }, { "model": "ucosminexus application server standard )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-10" }, { "model": "device manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1.1-00" }, { "model": "cosminexus application server enterprise )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "06-51" }, { "model": "jre .0 01", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4" }, { "model": "jp1/integrated management service support", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "-08-50-04" }, { "model": "cosminexus application server 05-00-/i", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "jdk 01-b06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.6" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.2-00" }, { "model": "jp1/integrated management service support", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "-08-11" }, { "model": "jdk 003", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.1" }, { "model": "ucosminexus application server standard 06-72-/b", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "08-00-02" }, { "model": "device manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1.1-04" }, { "model": "ucosminexus application server enterprise 06-70-/n", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "jp1/integrated management service support", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "-08-10-05" }, { "model": "tiered storage manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1.1-01" }, { "model": "jre 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4.2" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "08-00" }, { "model": "cosminexus application server enterprise 06-00-/f", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "jp1/cm2/network node manager starter ed enterprise", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "08-10" }, { "model": "jdk", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "device manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.0-06" }, { "model": "cosminexus application server 05-00-/a", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "jre 1.5.0.0 09", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "device manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.0-00" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-00" }, { "model": "ucosminexus application server standard 06-71-/g", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "jp1/integrated management service support", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "-08-11-03" }, { "model": "jp1/cm2/network node manager starter edition", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "25008-00" }, { "model": "ucosminexus application server enterprise 06-71-/h", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "jp1/integrated management service support", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "-08-50-03" }, { "model": "ucosminexus application server standard 06-71-/c", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server standard 06-71-/a", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.2-01" }, { "model": "jdk 06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "ucosminexus application server enterprise )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-10" }, { "model": "device manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1-02" }, { "model": "device manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1.1-04" }, { "model": "cosminexus application server 05-05-/l", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server standard )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "06-51" }, { "model": "jre 1.4.2 28", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "device manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.2-01" }, { "model": "cosminexus application server 05-00-/b", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server standard 06-71-/h", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "processing kit for xml 01-05-/c", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "jre 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 1.3.1 16", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-00-09" }, { "model": "jdk .0 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-00-09" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-00-10" }, { "model": "ucosminexus application server standard )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "08-00" }, { "model": "jre 1.3.1 28", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-00-10" }, { "model": "cosminexus application server 05-05-/j", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "jdk 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "cosminexus application server enterprise 06-51-/e", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-03-02" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-03-02" }, { "model": "jre", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "cosminexus application server standard", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "06-51" }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "08-00-02" }, { "model": "replication manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.2-00" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-10-01" }, { "model": "cosminexus application server 05-00-/c", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-00-09" }, { "model": "jre 1.3.1 15", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "replication manager software )", "scope": "ne", "trust": 0.6, "vendor": "hitachi", "version": "7.3-00" }, { "model": "ucosminexus application server standard 06-70-/n", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "device manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1.1-00" }, { "model": "ucosminexus application server standard 06-72-/d", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "device manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.2-02" }, { "model": "cosminexus application server standard 06-51-/d", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "jdk 1.5.0.0 08", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "jre .0 04", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-00-10" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "06-71" }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-00-10" }, { "model": "device manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1-00" }, { "model": "cosminexus application server standard", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "06-02" }, { "model": "jdk 006", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "processing kit for xml 02-00-/d", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "device manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.2-00" }, { "model": "ucosminexus service platform )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "08-00" }, { "model": "jp1/integrated management service support", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "-08-51" }, { "model": "processing kit for xml )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "02-05" }, { "model": "jp1/cm2/snmp system observer", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "09-00" }, { "model": "jdk 05", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "cosminexus application server enterprise 06-51-/c", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "jdk 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "device manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1-02" }, { "model": "ucosminexus application server standard 06-70-/h", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server enterprise", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "06-02" }, { "model": "jre b 07", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.7" }, { "model": "jdk .0 03", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "jdk 1.5.0 12", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "replication manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1-01" }, { "model": "ucosminexus application server enterprise 06-71-/g", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server standard 06-00-/i", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "replication manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1-00" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "08-00-02" }, { "model": "jdk 10", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4.2" }, { "model": "jre 1.3.1 17", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "jre 12", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-00-09" }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-03-02" }, { "model": "jre 1.6.0 2", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1-01" }, { "model": "cosminexus application server standard 06-51-/c", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server standard 06-00-/h", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server enterprise 06-00-/g", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-00-09" }, { "model": "cosminexus application server enterprise 06-51-/d", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "jre 1.4.2 27", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "jdk 11", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.4.2" }, { "model": "jdk 07-b03", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "tiered storage manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1.1-00" }, { "model": "jdk 06", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "06-71" }, { "model": "jre b 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.7" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-00-10" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-03-02" }, { "model": "jre 01", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.3" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "08-00-02" }, { "model": "cosminexus application server standard 06-02-/f", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server 05-05-/o", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "device manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1-03" }, { "model": "device manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1-00" }, { "model": "jp1/cm2/network node manager starter edition", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "25008-10" }, { "model": "jre 1.5.0.0 08", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "cosminexus application server enterprise 06-02-/e", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "jdk 002", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 1.3.1 19", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "jre 008", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "processing kit for xml", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "02-05" }, { "model": "tiered storage manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.2-00" }, { "model": "jp1/cm2/network node manager starter ed enterprise", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "08-00" }, { "model": "jdk 1.5.0.0 12", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-00-10" }, { "model": "jre 1.3.1 18", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "ucosminexus application server standard 06-71-/d", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "jdk 004", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-10-01" }, { "model": "cosminexus application server enterprise", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "06-51" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-03-02" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1-00" }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-03-02" }, { "model": "jdk 009", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.6" }, { "model": "ucosminexus application server enterprise )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "08-00" }, { "model": "cosminexus application server enterprise 06-02-/f", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server enterprise 06-70-/b )", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "jdk 004", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.1" }, { "model": "ucosminexus application server standard )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-60" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-10-06" }, { "model": "ucosminexus application server enterprise 06-71-/a", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server enterprise 06-00-/h", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "jdk b 007", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.7" }, { "model": "jdk 1.5.0.0 09", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "cosminexus application server standard 06-00-/g", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server standard 06-00-/f", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "tiered storage manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1-00" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1.1-01" }, { "model": "jp1/integrated management service support", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "-08-50" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-03-02" }, { "model": "jp1/integrated management service support", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "-08-10-06" }, { "model": "jp1/integrated management service support", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "-08-10" }, { "model": "device manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.2-02" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-00-09" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-00-09" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "08-00-02" }, { "model": "cosminexus application server enterprise 06-00-/i", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "device manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.2-00" }, { "model": "jdk 1.5.0.0 11", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "jdk 11-b03", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.5" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-00-09" }, { "model": "jp1/integrated management service support", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "-08-11-04" }, { "model": "tiered storage manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.1-01" }, { "model": "jre 012", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.2.2" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "07-00-10" }, { "model": "jre 005", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "cosminexus application server enterprise )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "06-50" }, { "model": "cosminexus application server standard )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "06-50" }, { "model": "cosminexus application server standard 06-02-/e", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server 05-05-/k", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "tiered storage manager software )", "scope": "eq", "trust": 0.6, "vendor": "hitachi", "version": "6.2-01" }, { "model": "cosminexus application server standard 06-51-/e", "scope": null, "trust": 0.6, "vendor": "hitachi", "version": null }, { "model": "jre 1.5.0.0 07", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "jdk 1.6.0 01", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "jre 009", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "1.1.8" }, { "model": "jre 1.6.0 20", "scope": null, "trust": 0.6, "vendor": "sun", "version": null }, { "model": "tivoli dynamic workload broker", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0" }, { "model": "virtual i/o server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-00" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "cosminexus developer professional 06-02-/e", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jboss enterprise web server for rhel es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "41.0" }, { "model": "tiered storage manager software", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-08" }, { "model": "cosminexus application server 05-00-/m", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6" }, { "model": "ucosminexus application server standard )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00" }, { "model": "processing kit for xml 01-07-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "jp1/hicommand tiered storage manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-50" }, { "model": "interstage application server plus", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "7.0.1" }, { "model": "cognos business intelligence fp1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "88.4.1" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.4" }, { "model": "cosminexus developer light 06-50-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "device manager software (linux(sles", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "7.1.0-00" }, { "model": "processing kit for xml 01-07-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tivoli netcool omnibus web gui", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.0" }, { "model": "device manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.1-02" }, { "model": "cosminexus application server 05-02-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server enterprise 06-72-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "enterprise linux as extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "replication manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.1-01" }, { "model": "cognos workforce performance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "ucosminexus developer professional 06-70-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/integrated management service support", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-08-50-02" }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-20-02" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.17" }, { "model": "cosminexus developer light", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-02" }, { "model": "network node manager i", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "8.1" }, { "model": "cosminexus developer 05-05-/h", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "db2 fixpack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.55" }, { "model": "ucosminexus developer standard 06-70-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer light 06-00-/e", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cognos customer performance analytics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "cosminexus developer 05-05-/j", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.19" }, { "model": "ucosminexus application server enterprise 06-70-/h", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/integrated management service support", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-08-50-01" }, { "model": "cosminexus server web edition 04-00-/a", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer light 06-00-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server standard 06-50-/c (solari", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/cm2/network node manager starter ed enterprise (hp-ux(pa-r", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-00-02" }, { "model": "cosminexus developer light 06-02-/e", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-03-03" }, { "model": "tivoli workload scheduler", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "provisioning manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0.0-00" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.2" }, { "model": "systemwalker availability view enterprise edition 13.3.0a", "scope": null, "trust": 0.3, "vendor": "fujitsu", "version": null }, { "model": "os/400 v5r4m0", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "device manager software (linux(sles", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-08" }, { "model": "cosminexus developer light", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-50" }, { "model": "cosminexus developer standard 06-51-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jdk 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.1" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.107" }, { "model": "cosminexus application server enterprise 06-02-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server 05-00-/r", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-02" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "7.0.5" }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-01" }, { "model": "tivoli netcool performance manager for wireless", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.2" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-72" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0.0-00" }, { "model": "tiered storage manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0.0-00" }, { "model": "cosminexus developer professional 06-51-/h", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/hicommand replication monitor", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-50-01" }, { "model": "tivoli storage productivity center", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.1" }, { "model": "cognos mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "tivoli foundations for application manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.1" }, { "model": "cosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-50" }, { "model": "cosminexus application server standard 06-51-/h", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "hp-ux web server suite", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "3.14" }, { "model": "linux enterprise sdk sp3", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "cosminexus developer 05-05-/e", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.18" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.2" }, { "model": "cosminexus application server 05-01-/k", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer light 06-50-/e", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jboss enterprise soa platform", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5.0.2" }, { "model": "jboss enterprise portal platform", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5.1.0" }, { "model": "cosminexus developer standard 06-51-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.35" }, { "model": "tivoli composite application manager for websphere", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "jre b", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "ucosminexus developer standard 06-71-/h", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.14" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "7.0.3" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.0" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-03" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-03" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-20" }, { "model": "jp1/hicommand tiered storage manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-30" }, { "model": "cosminexus developer light 06-51-/k", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.0" }, { "model": "tivoli workload scheduler", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.3" }, { "model": "websphere application server community edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.1.4" }, { "model": "jre .0 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-01" }, { "model": "linux armel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "jp1/hicommand provisioning manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "02-30" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.22" }, { "model": "ucosminexus developer light 06-71-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tivoli enterprise console", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "jdk 1.5.0 11", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "cosminexus developer professional 06-00-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.128" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-10" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-01" }, { "model": "jdk 09", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.6" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5" }, { "model": "it operations director", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "02-50-06" }, { "model": "cosminexus application server enterprise 06-50-c (solaris", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "jrockit r28.0.0", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.2" }, { "model": "ucosminexus client 06-70-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jre 12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "cosminexus application server standard 06-51-/k", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tivoli netcool performance manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1" }, { "model": "cognos impromptu web reports", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-02" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-10" }, { "model": "jdk 1.5.0.0 06", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.3" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "cosminexus developer standard 06-00-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer standard 06-02-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/cm2/network node manager starter edition enterprise hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-10-02" }, { "model": "reflection for secure it unix server sp1", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "7.0" }, { "model": "cosminexus developer professional 06-00-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/hicommand tiered storage manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "04-00" }, { "model": "interstage application server standard-j edition 9.1.0b", "scope": null, "trust": 0.3, "vendor": "fujitsu", "version": null }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50" }, { "model": "device manager software (solaris", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1-00(x64))" }, { "model": "cosminexus developer light 06-02-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "conferencing standard edition", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3-2" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.18" }, { "model": "tru64 unix 5.1b-4", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.2" }, { "model": "vcenter update manager update", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.11" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.2" }, { "model": "linux sparc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "ucosminexus developer standard 06-70-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "interstage application server plus", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "6.0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.11" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.5" }, { "model": "cosminexus developer professional 06-51-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "7.0.1" }, { "model": "vcenter update manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "ucosminexus application server enterprise )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00" }, { "model": "cognos express", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "tuning manager software", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "7.1.0-00" }, { "model": "jrockit r28.1.1", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "tivoli dynamic workload console", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "identity manager remote loader", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.6.1" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.5" }, { "model": "cosminexus application server standard 06-51-/j", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/hicommand global link availability manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-30" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-03-03" }, { "model": "jp1/hicommand tuning manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "processing kit for xml )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "02-00" }, { "model": "jp1/hicommand global link availability manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-02" }, { "model": "tivoli workload scehdule z/os connector", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "cosminexus studio web edition 04-01-/a", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tuning manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.401" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.126" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "7.0" }, { "model": "cosminexus developer 05-05-/i", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer professional 06-70-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10-01" }, { "model": "ucosminexus client 06-70-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.5" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.018" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.019" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.3" }, { "model": "enterprise linux hpc node optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "cosminexus developer professional 06-00-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.6" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.22" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-02" }, { "model": "enterprise linux server supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-20" }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-01" }, { "model": "identity manager roles based provisioning module", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.6.1" }, { "model": "systems insight manager sp2", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.2" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.23" }, { "model": "cosminexus developer professional 06-00-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jdk 1.5.0 11-b03", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "tivoli network manager ip edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.8" }, { "model": "cosminexus developer light 06-00-/i", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server standard 06-02-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "nonstop server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6" }, { "model": "provisioning manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-07" }, { "model": "cosminexus developer 05-05-/o", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "reflection for secure it windows server sp1", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "7.0" }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10-06" }, { "model": "jre 007", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "replication manager software -00 )", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "7.3" }, { "model": "enterprise linux workstation supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "cosminexus developer professional 06-02-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server enterprise 06-50-/i", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer professional 06-70-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.25" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.0" }, { "model": "systems insight manager sp3", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.0" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-60" }, { "model": "ucosminexus client 06-70-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "ucosminexus developer standard 06-71-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-03" }, { "model": "jre 15", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2009.0" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-07" }, { "model": "cosminexus developer light 06-51-/i", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3-1" }, { "model": "jp1/hicommand replication monitor", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "jboss enterprise web platform for rhel server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "55" }, { "model": "jp1/hicommand global link availability manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-40" }, { "model": "tiered storage manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-07" }, { "model": "cosminexus developer light 06-00-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer light 06-50-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jboss enterprise web platform for rhel 4as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "cosminexus developer professional 06-51-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/hicommand global link availability manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-10" }, { "model": "jdk 04", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "ucosminexus service platform )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10" }, { "model": "tiered storage manager software (linux(rhel", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "7.1.0-00" }, { "model": "ucosminexus developer light 06-70-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus client 06-51-/k", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "device manager software (solaris", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0-00(x64))" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "global link manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1-01" }, { "model": "ewas", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.138" }, { "model": "cosminexus developer 05-01-/h", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "db2 fixpack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.18" }, { "model": "cosminexus developer 05-01-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tivoli management framework", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.1.1" }, { "model": "interstage application server standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.3.1" }, { "model": "cosminexus application server enterprise 06-51-/i", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-60" }, { "model": "cosminexus developer light 06-51-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "hp-ux web server suite", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "2.33" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.4" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-05" }, { "model": "cosminexus application server enterprise 06-51-/k", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tivoli federated identity manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1" }, { "model": "jp1/cm2/network node manager starter ed enterprise hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-00-03" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.0.14" }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.1" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-09" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.0.30" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.4" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.3" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.2-00" }, { "model": "cosminexus developer 05-01-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/hicommand global link availability manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-01" }, { "model": "ucosminexus application server enterprise )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-80" }, { "model": "reflection for secure it unix client", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "7.2" }, { "model": "cosminexus developer light 06-51-/j", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tiered storage manager software (linux(rhel", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-08" }, { "model": "jp1/cm2/network node manager starter edition (hp-ux(pa-risc", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "25008-10" }, { "model": "cosminexus developer 05-01-/k", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10-01" }, { "model": "cosminexus developer professional 06-00-/h", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "linux enterprise java sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "jre 009", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "jre 1.5.0 08", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "cosminexus developer light 06-51-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-02" }, { "model": "jp1/hicommand global link availability manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-03" }, { "model": "jp1/hicommand provisioning manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-90" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.2" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.0.13" }, { "model": "cognos planning", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.15" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0" }, { "model": "cosminexus developer", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "5" }, { "model": "desktop extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "ucosminexus application server enterprise 06-70-/a (windows(ip", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-02" }, { "model": "jp1/hicommand global link availability manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-05" }, { "model": "jre b 005", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "tiered storage manager software (linux(sles", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "7.1.0-00" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.29" }, { "model": "jboss enterprise application platform for rhel 4as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "websphere application server community edition", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "2.1.1.5" }, { "model": "tuning manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.2-00" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "tivoli configuration manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.2.3" }, { "model": "cognos business intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "cosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-50" }, { "model": "jdk update21", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-20-01" }, { "model": "systems insight manager sp1", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.2" }, { "model": "jre 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "device manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.1-02" }, { "model": "replication manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.0-00" }, { "model": "network node manager i", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.1" }, { "model": "esx patch esx400-201", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "tiered storage manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.2.0-00" }, { "model": "netcool/omnibus fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.3.020" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.8" }, { "model": "cosminexus application server 05-01-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer professional 06-51-/e", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.20" }, { "model": "cosminexus developer light", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-51" }, { "model": "conferencing standard edition", "scope": "ne", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "identity manager designer", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "4.0" }, { "model": "cosminexus developer light", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-00" }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50" }, { "model": "cosminexus developer 05-05-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jre 21", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "enterprise linux hpc node", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.2" }, { "model": "enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.7" }, { "model": "linux enterprise java sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-05" }, { "model": "tivoli directory server 6.1.0.5-tiv-itds-if0", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "virtualcenter update", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.56" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-09" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.115" }, { "model": "ewas", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "6.139" }, { "model": "tomcat beta", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "7.0" }, { "model": "tivoli workload scheduler", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "cosminexus developer professional 06-50-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.102" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00" }, { "model": "systemwalker availability view enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "13.3" }, { "model": "websphere mq file transfer edition", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "interstage application server standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.2" }, { "model": "cosminexus studio 05-00-/i", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server 05-00-/l", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer professional 06-71-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-09" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.15" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.2" }, { "model": "device manager software (linux(sles", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.3.0-00" }, { "model": "linux mips", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "systemwalker it process master standard edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "13.3.1" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.103" }, { "model": "device manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1-03" }, { "model": "ucosminexus developer professional 06-71-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-02" }, { "model": "linux m68k", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "tiered storage manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-07" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10" }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10-01" }, { "model": "db2 fixpack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.56" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00" }, { "model": "cosminexus developer standard 06-50-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-05" }, { "model": "jrockit r27.6.0-50", "scope": "eq", "trust": 0.3, "vendor": "oracle", "version": "1.5.015" }, { "model": "jp1/hicommand tuning manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-50" }, { "model": "cosminexus application server 05-02-/e", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-50" }, { "model": "interstage application server standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.0" }, { "model": "virtualcenter update", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.55" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.3" }, { "model": "jdk 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6" }, { "model": "reflection suite for", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "x2011" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.7" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10" }, { "model": "cosminexus studio 05-01-/l", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "hp-ux web server suite", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.32" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.6" }, { "model": "ucosminexus application server enterprise 06-70-/a linux )", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jrockit r27.6.5", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.222" }, { "model": "jdk 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "device manager software", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-08" }, { "model": "cics transaction gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-20-02" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.5" }, { "model": "ucosminexus developer professional 06-70-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "systems insight manager sp1", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.0" }, { "model": "jboss enterprise application platform el4", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.3" }, { "model": "processing kit for xml 02-00-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.4" }, { "model": "ucosminexus application server enterprise 06-71-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer light 06-71-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer professional 06-71-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.21" }, { "model": "linux enterprise server sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.3.1" }, { "model": "cosminexus application server standard 06-50-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server enterprise 06-51-/h", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "enterprise linux extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.6" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "vcenter update", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.03" }, { "model": "global link manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.5-00" }, { "model": "rational clearcase", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.2" }, { "model": "cosminexus application server enterprise 06-50-/c (hp-ux(", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server standard 06-70-/l", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer professional 06-00-/i", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jdk 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.4" }, { "model": "cosminexus application server 05-02-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.2" }, { "model": "device manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-07" }, { "model": "cosminexus developer standard 06-50-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cognos supply chain performance analytics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.27" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.105" }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-09" }, { "model": "global link manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "tomcat", "scope": "ne", "trust": 0.3, "vendor": "apache", "version": "7.0.8" }, { "model": "ucosminexus application server enterprise 06-70-/m", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cognos mobile", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "network satellite server (for rhel", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5)5.4" }, { "model": "tivoli federated identity manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "systems insight manager sp5", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.0" }, { "model": "jre 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "tuning manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.001" }, { "model": "tivoli composite application manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.3" }, { "model": "jdk update24", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "cosminexus application server 05-02-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "tru64 unix pk6", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.1.0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.5" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.0.9" }, { "model": "jp1/hicommand provisioning manager )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-10" }, { "model": "tiered storage manager software", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "7.1.0-00" }, { "model": "device manager software (linux(sles", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-07" }, { "model": "enterprise linux desktop supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "jp1/cm2/network node manager starter edition enterprise hp-ux pa-ri", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-10-02" }, { "model": "cosminexus application server 05-01-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/hicommand replication monitor", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-50-02" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.3" }, { "model": "replication manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0.0-00" }, { "model": "jre 21", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "db2 fixpack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.19" }, { "model": "cosminexus developer standard 06-51-/h", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "os/400 v6r1m0", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "cosminexus developer standard 06-02-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer professional 06-50-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "replication manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.2-00" }, { "model": "jdk 1.5.0.0 04", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "interstage business application server standard edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-71" }, { "model": "tivoli foundations for application manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "db2 fix pack 3a", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "db2 fixpack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.110" }, { "model": "jp1/hicommand tiered storage manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-20" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.0.6" }, { "model": "cognos business viewpoint", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "jboss enterprise application platform for rhel server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "55" }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-20-02" }, { "model": "cosminexus developer 05-01-/j", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-05" }, { "model": "cosminexus developer light 06-51-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tivoli federated identity manager", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "6.2.0.9" }, { "model": "cognos business intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "88.4.1" }, { "model": "hp-ux web server suite", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.13" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1-00" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.04" }, { "model": "processing kit for xml", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "01-07" }, { "model": "cosminexus developer 05-01-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/hicommand tuning manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "04-00" }, { "model": "ucosminexus client 06-71-/h", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-10" }, { "model": "tuning manager software (solaris(sp", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-03" }, { "model": "enterprise linux for sap server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "jp1/hicommand tiered storage manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-50-02" }, { "model": "jp1/hicommand replication monitor", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-30" }, { "model": "tru64 unix b-3", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.1.0" }, { "model": "processing kit for xml 02-00-/e", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer standard 06-00-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "runtimes for java technology", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.0" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.2" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.0.5" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.013" }, { "model": "jdk 1.3.1 20", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.0-00" }, { "model": "cosminexus developer 05-05-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer light 06-00-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tiered storage manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.0-00" }, { "model": "cosminexus developer light 06-51-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "linux ia-32", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "enterprise server x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "jdk 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5" }, { "model": "vcenter update manager", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.1" }, { "model": "cosminexus studio 05-05-/q", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "access manager", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.1" }, { "model": "jp1/integrated management service support", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-08-10-04" }, { "model": "cosminexus developer professional 06-00-/e", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server 05-00-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "replication manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.1-01" }, { "model": "cosminexus developer light 06-00-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server standard hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10-01" }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.0" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.1" }, { "model": "virtualcenter update", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.52" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "jp1/cm2/network node manager starter edition hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "25008-00-03" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1" }, { "model": "cosminexus application server 05-00-/p", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer 05-05-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/hicommand global link availability manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-20" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.2" }, { "model": "provisioning manager software (linux(sles", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.3.0-00" }, { "model": "cosminexus application server", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-01" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.4" }, { "model": "jdk update13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.5" }, { "model": "tivoli netcool portal", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.1" }, { "model": "jp1/hicommand replication monitor", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "04-00" }, { "model": "ucosminexus application server standard 06-70-/a (windows(ip", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.12" }, { "model": "jp1/cm2/network node manager starter ed enterprise (hp-ux(pa-r", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-00-01" }, { "model": "tivoli directory server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.3" }, { "model": "tivoli workload scheduler", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.4" }, { "model": "cognos metrics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "jrockit r28.0.1", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "tivoli netview for z/os", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.4.0" }, { "model": "jdk update19", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "interstage application server plus", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "5.0.1" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.1" }, { "model": "processing kit for xml 01-05-/b (windows(en", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.21" }, { "model": "cosminexus developer light 06-02-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tivoli federated identity manager business gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1" }, { "model": "linux enterprise desktop sp3", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-02" }, { "model": "jp1/hicommand replication monitor", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-40" }, { "model": "cosminexus developer 05-05-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-51" }, { "model": "jp1/hicommand replication monitor", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-10" }, { "model": "cosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-00" }, { "model": "jp1/hicommand global link availability manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-60-01" }, { "model": "jp1/hicommand provisioning manager (solaris(sparc", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "02-30" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.30" }, { "model": "reflection", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "x2011" }, { "model": "ucosminexus developer light 06-71-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tivoli netcool portal", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1.2" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.16" }, { "model": "totalstorage ds8300", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "interstage application server standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.1" }, { "model": "cosminexus developer standard 06-50-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/hicommand global link availability manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-00" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.31" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.0.3" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.0.31" }, { "model": "virtualcenter 2.5.update build", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "31" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-02" }, { "model": "cosminexus developer light 06-50-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jboss enterprise web server for rhel as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "41.0" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.30" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.14" }, { "model": "cosminexus developer professional 06-02-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer light", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-71" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.19" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.117" }, { "model": "cics transaction gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.0" }, { "model": "linux i386", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "virtualcenter", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5" }, { "model": "jrockit r27.6.7", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "device manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-07" }, { "model": "jdk b", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.7" }, { "model": "jp1/cm2/network node manager starter ed enterprise (hp-ux(pa-risc", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-10" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-10" }, { "model": "vcenter", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "ucosminexus developer standard 06-71-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jre 10-b03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "jrockit r27.6.0", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "hp-ux b.11.31", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "jp1/integrated management service support", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-08-10-02" }, { "model": "cosminexus developer professional 06-51-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tru64 unix b-4", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.1.0" }, { "model": "jre 07", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5" }, { "model": "jp1/hicommand tiered storage manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-40" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.8" }, { "model": "cosminexus developer professional 06-02-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.23" }, { "model": "jp1/hicommand tiered storage manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-10" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-20" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.1" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.0.4" }, { "model": "cosminexus developer light 06-00-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.1" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.10" }, { "model": "replication manager software", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "7.3.0-00" }, { "model": "cosminexus application server 05-01-/e", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.11" }, { "model": "jp1/cm2/network node manager starter ed enterprise )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-10" }, { "model": "jp1/integrated management service support", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-08-10-03" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.13" }, { "model": "cosminexus application server 05-01-/j", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0" }, { "model": "tivoli storage manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "cosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-51" }, { "model": "cognos planning", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "jp1/cm2/network node manager starter edition (hp-ux(pa-risc", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "25008-00" }, { "model": "aura conferencing sp1 standard", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.17" }, { "model": "provisioning manager software (linux(sles", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-07" }, { "model": "jp1/cm2/network node manager starter edition hp-ux(pa-ri", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "25008-10-12" }, { "model": "ucosminexus client 06-71-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-00" }, { "model": "tivoli netcool reporter", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.1" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-02" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-20" }, { "model": "cics transaction gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-12" }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10-08" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.2" }, { "model": "processing kit for xml", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "01-00" }, { "model": "linux enterprise desktop sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "tiered storage manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.0-00" }, { "model": "jp1/performance management web console", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-0" }, { "model": "tuning manager software", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-03" }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-03" }, { "model": "jre 04", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "ucosminexus developer professional 06-71-/h", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus client 06-71-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.2" }, { "model": "provisioning manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-07" }, { "model": "jdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "reflection for secure it unix client", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.0" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50" }, { "model": "rational clearquest", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.1.2.2" }, { "model": "provisioning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-07" }, { "model": "ucosminexus developer professional 06-71-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "enterprise linux desktop optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux hpc node supplementary", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "enterprise linux desktop supplementary client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "ucosminexus developer standard 06-70-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "it operations analyzer", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "02-51" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "tuning manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0" }, { "model": "jdk update17", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "ucosminexus developer professional 06-70-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/cm2/network node manager i", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.26" }, { "model": "cosminexus developer 05-05-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-10" }, { "model": "runtimes for java technology sr12 fp", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "5.04" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.119" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.221" }, { "model": "sdk 02", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.8" }, { "model": "cosminexus application server standard 06-51-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-72(*1)" }, { "model": "tivoli composite application manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.0.1" }, { "model": "hp-ux web server suite", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.12" }, { "model": "cosminexus developer standard 06-50-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jdk 0 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5" }, { "model": "cognos query", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.4" }, { "model": "cosminexus developer professional 06-50-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.1" }, { "model": "jdk update20", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "jp1/cm2/snmp system observer", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "jp1/serverconductor/control manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "7.0.2" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "1.1-1" }, { "model": "cosminexus developer professional 06-51-/i", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "aura conferencing standard", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "tiered storage manager software (solaris(sp", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-08" }, { "model": "cognos finance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "7.0.1" }, { "model": "jp1/cm2/network node manager starter edition windows", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "25008-00-03" }, { "model": "ucosminexus application server standard 06-70-/m", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus client 06-00-/i", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server 05-00-/s", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "ucosminexus application server enterprise 06-72-/b )", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "linux enterprise for sap applications sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "device manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-07" }, { "model": "linux hppa", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-02" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.3" }, { "model": "replication manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0.0-00" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-60" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0.4" }, { "model": "global link manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.2-00" }, { "model": "processing kit for xml", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "jdk 20", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "jp1/hicommand replication monitor", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-50-03" }, { "model": "cosminexus developer light 06-50-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "device manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.0-00" }, { "model": "vcenter update", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "4.12" }, { "model": "cosminexus developer 05-05-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server enterprise 06-70-/o", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer 05-01-/i", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer professional 06-02-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer standard 06-00-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jboss enterprise soa platform cp04", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.3" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.04" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.06" }, { "model": "tivoli workload scheduler for applications", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "cosminexus developer 05-05-/l", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cognos powerplay", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "sdk 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "processing kit for xml (windows(engli", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "01-05" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-20-01" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "tivoli netcool performance manager technology pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "jp1/hicommand provisioning manager (solaris(sparc", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-90" }, { "model": "jre 1.5.0 09-b03", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "systems insight manager sp2", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.2" }, { "model": "job management partner 1/performance management web console", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-0" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.1" }, { "model": "device manager software (linux(sles", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.0-00" }, { "model": "device manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0-06" }, { "model": "tivoli federated identity manager business gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "cosminexus developer standard 06-51-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "cosminexus developer light 06-02-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "cosminexus developer light 06-02-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tivoli configuration manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.3.1" }, { "model": "device manager software (solaris", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1.1-04(x64))" }, { "model": "linux enterprise sp4", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "rational clearcase", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.5" }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-03-03" }, { "model": "device manager software (linux(rhel", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-08" }, { "model": "jboss enterprise web server for rhel server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "51.0" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.0" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00" }, { "model": "linux mandrake x86 64", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-20-01" }, { "model": "jdk 13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.12" }, { "model": "cosminexus application server 05-01-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "provisioning manager software (linux(rhel", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-08" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.2-01" }, { "model": "linux powerpc", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "jdk 08", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-02" }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-20" }, { "model": "identity manager analyzer", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "1.2" }, { "model": "openvms", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "0" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-05" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.27" }, { "model": "reflection for secure it unix server sp1", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "7.2" }, { "model": "virtualcenter update", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.54" }, { "model": "systems insight manager sp1", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.2" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-70" }, { "model": "tivoli federated identity manager business gateway", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "6.2.0.9" }, { "model": "identity manager designer", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.5.1" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.2" }, { "model": "interstage application server standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0" }, { "model": "jrockit r27.1.0", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "application manager for smart business", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2.1" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-03-03" }, { "model": "ucosminexus application server standard 06-70-/k", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer standard 06-71-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "enterprise linux supplementary server", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.18" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.4" }, { "model": "device manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0-00" }, { "model": "cosminexus application server standard 06-51-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/hicommand tiered storage manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-90" }, { "model": "device manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "jboss enterprise application platform el5", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4.3" }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-60" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.127" }, { "model": "jre 18", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.111" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.31" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.118" }, { "model": "enterprise linux workstation", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "cosminexus studio 05-05-/p", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "provisioning manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0.0-00" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.124" }, { "model": "enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "interstage software quality analyzer", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "10.0" }, { "model": "device manager software", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "7.1.0-00" }, { "model": "jrockit r27.6.6", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0.0.96" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.012" }, { "model": "jp1/hicommand tuning manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-20" }, { "model": "jre 05a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "it operations analyzer", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "02-51-01" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.16" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.402" }, { "model": "jrockit r27.6.8", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "6.0" }, { "model": "cosminexus developer light 06-51-/h", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "netcool/omnibus fix pack", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.3.120" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.0.19" }, { "model": "linux", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.33" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.5" }, { "model": "tiered storage manager software (linux(sles", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.1-02" }, { "model": "tomcat", "scope": "ne", "trust": 0.3, "vendor": "apache", "version": "6.0.32" }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "jdk 15", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-20-02" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "ucosminexus application server enterprise hp-ux )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00" }, { "model": "cosminexus developer professional 06-51-/j", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server 05-01-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jboss enterprise application platform for rhel 4es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "ucosminexus developer light 06-70-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5" }, { "model": "linux alpha", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "ucosminexus developer light 06-70-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "linux enterprise server sp3", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "reflection for secure it windows server sp1", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "7.2" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.17" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-71" }, { "model": "jp1/integrated management service support", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-08-11-02" }, { "model": "ucosminexus application server enterprise hp-ux )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10" }, { "model": "jre 099", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.12" }, { "model": "jp1/cm2/network node manager starter edition enterprise", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-10-02" }, { "model": "tiered storage manager software (linux(sles", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.3.0-00" }, { "model": "jre beta", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-01" }, { "model": "jp1/integrated management service support", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-08-51-01" }, { "model": "jp1/hicommand global link availability manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-70" }, { "model": "cognos visualizer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.11" }, { "model": "cosminexus developer light 06-02-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer light 06-02-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "it operations director", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "02-50-01" }, { "model": "jrockit r27.6.4", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "cognos financial performance analytics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "tivoli storage productivity center fix pack", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "4.2.14" }, { "model": "opensuse", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "11.2" }, { "model": "cosminexus developer 05-01-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.015" }, { "model": "jp1/hicommand replication monitor", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-20" }, { "model": "cosminexus developer standard 06-00-/e", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer light 06-51-/e", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer 05-01-/l", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.106" }, { "model": "cosminexus studio web edition 04-00-/a", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cognos powerplay", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "cosminexus developer 05-05-/q", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/cm2/network node manager starter edition )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "25008-10" }, { "model": "linux mandrake", "scope": "eq", "trust": 0.3, "vendor": "mandriva", "version": "2010.1" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.219" }, { "model": "linux ia-64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "cosminexus application server 05-01-/h", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cognos noticecast", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.125" }, { "model": "sentinel support pack", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.12" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.0" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-01" }, { "model": "cosminexus developer standard 06-51-/i", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tivoli storage manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "cosminexus application server standard 06-50-/c (hp-ux(", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "7.0.4" }, { "model": "hp-ux b.11.23", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "interstage application server plus", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "7.0" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.7" }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-20-01" }, { "model": "systems insight manager", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "7.0" }, { "model": "cosminexus application server 05-00-/e", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "device manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.0-00" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.5" }, { "model": "jdk 1.4.2 11", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "jp1/hicommand tuning manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-30" }, { "model": "jp1/hicommand replication monitor", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-60-01" }, { "model": "jre 14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "ucosminexus developer light 06-70-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/cm2/network node manager starter edition solaris", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "25008-00-03" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1.2" }, { "model": "jre 13", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "ucosminexus application server enterprise 06-70-/g )", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/automatic job management system web operation assistant", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "3-0" }, { "model": "jdk 12", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "tivoli directory server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "enterprise linux workstation optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "cognos metrics", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-03-03" }, { "model": "jp1/it resource management-manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "ucosminexus developer light", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-70" }, { "model": "cosminexus developer professional 06-51-/k", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/hicommand replication monitor", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-00" }, { "model": "reflection for secure it windows server", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "7.2" }, { "model": "jdk 11", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "jp1/cm2/network node manager starter ed enterprise )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-00" }, { "model": "jp1/cm2/network node manager starter edition (hp-ux(pa-r", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "25008-00-02" }, { "model": "provisioning manager software", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-08" }, { "model": "jdk update23", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "linux enterprise server sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.3" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.0.12" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.03" }, { "model": "cognos web services", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.0.16" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.10" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.6" }, { "model": "jre 28", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "device manager software (solaris(sp", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "7.1.0-00" }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-72" }, { "model": "cosminexus studio standard edition", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "4" }, { "model": "db2 fixpak", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.55" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.4" }, { "model": "db2 fix pack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.51" }, { "model": "cosminexus developer standard 06-50-/e", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00" }, { "model": "cosminexus developer", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-01" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.9" }, { "model": "cosminexus application server 05-00-/q", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/cm2/network node manager starter ed enterprise (hp-ux(pa-r", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-10-01" }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "reflection for secure it unix server", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.0" }, { "model": "global link manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1-00" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.24" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "cosminexus developer professional 06-00-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "sentinel support pack h", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "6.12" }, { "model": "replication manager software (linux(sles", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.0-00" }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10" }, { "model": "ucosminexus application server standard 06-70-/i", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tivoli netcool performance manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3" }, { "model": "cosminexus client 06-50-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tiered storage manager software (linux(sles", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-07" }, { "model": "cosminexus studio", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-01" }, { "model": "ucosminexus developer light 06-70-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer light 06-71-/h", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer light 06-70-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "device manager software (solaris", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1-02(x64))" }, { "model": "cosminexus developer 05-05-/p", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0" }, { "model": "jdk 01a", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "linux mipsel", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "linux enterprise teradata sp3", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "jp1/hicommand tuning manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-40" }, { "model": "jndi", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "jdk 0 09", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5" }, { "model": "device manager software (solaris(sp", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-08" }, { "model": "jp1/cm2/network node manager starter ed enterprise pa-risc", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-00-03" }, { "model": "jp1/hicommand tuning manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-10" }, { "model": "jp1/hicommand tiered storage manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-00" }, { "model": "ucosminexus developer standard 06-70-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-05" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.19" }, { "model": "cosminexus developer standard 06-00-/i", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "interstage job workload server", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.1" }, { "model": "provisioning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0.0-00" }, { "model": "cosminexus developer standard 06-51-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "vcenter", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.1" }, { "model": "cognos business intelligence fp2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "88.4.1" }, { "model": "jre 04", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.1" }, { "model": "ucosminexus developer standard 06-70-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jdk 099", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.021" }, { "model": "jre 006", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "enterprise linux server optional", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.29" }, { "model": "jp1/hicommand global link availability manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-60" }, { "model": "tuning manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1-00" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.0.2" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.2" }, { "model": "tivoli enterprise console", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "3.9" }, { "model": "linux enterprise java sp3", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "cosminexus studio", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-05" }, { "model": "cognos now!", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "4.0" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.4" }, { "model": "processing kit for xml 01-05-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer 05-05-/n", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "db2 fixpack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.73" }, { "model": "cosminexus application server 05-00-/n", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer professional 06-71-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tivoli netview for z/os", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3.0" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.6" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-01" }, { "model": "db2 fixpak", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.52" }, { "model": "hp-ux web server suite", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.31" }, { "model": "cosminexus developer 05-01-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tivoli storage productivity center", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "4.2.1.185" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-00" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.07" }, { "model": "reflection for secure it unix server", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "7.2" }, { "model": "jdk update25", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "cosminexus developer standard 06-00-/h", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "virtualcenter update", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.51" }, { "model": "jdk 04", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "replication manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.2" }, { "model": "replication manager software (linux(sles", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.1-01" }, { "model": "job management partner 1/automatic job management system web", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "2-0" }, { "model": "jdk 1.6.0 01-b06", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "cosminexus application server 05-00-/j", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "rational clearquest", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.5" }, { "model": "linux lpia", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "device manager software (solaris(sp", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.0-00" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "jp1/integrated management service support", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-08-10-01" }, { "model": "ucosminexus client 06-71-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer light 06-51-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-01" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.017" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "7.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.32" }, { "model": "provisioning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "jdk 1.5.0.0 03", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-10" }, { "model": "cosminexus developer standard 06-50-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.227" }, { "model": "cosminexus application server standard 06-50-/g (aix", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "vcenter update", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.11" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.1" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.13" }, { "model": "cosminexus developer standard 06-51-/e", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.0.11" }, { "model": "jp1/hicommand global link availability manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-50" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.224" }, { "model": "infosphere information server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.1" }, { "model": "cosminexus developer standard 06-02-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "novell linux pos", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "9" }, { "model": "linux s/390", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.27" }, { "model": "tivoli integrated portal", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "1.1.115" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.0.8" }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-71" }, { "model": "cosminexus studio web edition", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-04-01" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.15" }, { "model": "jdk 10", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "ucosminexus developer light 06-71-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jdk update18", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "tiered storage manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.1-02" }, { "model": "ucosminexus application server standard 06-72-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "device manager software (solaris", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1.1-00(x64))" }, { "model": "interstage application server enterprise edition 9.1.0b", "scope": null, "trust": 0.3, "vendor": "fujitsu", "version": null }, { "model": "ucosminexus application server enterprise )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10-1" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.28" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.20" }, { "model": "identity manager roles based provisioning module", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.7" }, { "model": "cosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0" }, { "model": "tivoli federated identity manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1.2" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-10" }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "interstage application server enterprise edition b", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.0.1" }, { "model": "tivoli composite application manager for websphere", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6" }, { "model": "tivoli federated identity manager", "scope": null, "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "ucosminexus developer professional 06-71-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jre", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.0" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.20" }, { "model": "cognos controller", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "job management partner 1/automatic job management system web", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "3-0" }, { "model": "ucosminexus developer standard 06-70-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "identity manager", "scope": "eq", "trust": 0.3, "vendor": "novell", "version": "3.6.1" }, { "model": "jp1/hicommand tiered storage manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-50-01" }, { "model": "cosminexus developer", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "5.0" }, { "model": "it operations director", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "02-50-07" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.112" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.0" }, { "model": "vcenter update", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.01" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.6" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.401" }, { "model": "cosminexus developer standard 06-00-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer standard 06-02-/e", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "linux enterprise sdk sp1", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "11" }, { "model": "ucosminexus developer professional 06-70-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tivoli netview for z/os", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2.0" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.122" }, { "model": "tivoli application dependency discovery manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.2" }, { "model": "hp-ux web server suite", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "3.10" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.7" }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.4" }, { "model": "device manager software (solaris", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0-06(x64))" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.32" }, { "model": "ucosminexus developer standard 06-71-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-02" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.6" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.24" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "10.04" }, { "model": "jndi/ldap", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.2" }, { "model": "db2 fix pack 6a", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "jrockit r27.6.2", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-60" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.2" }, { "model": "cosminexus developer professional 06-02-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus studio web edition", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "4" }, { "model": "db2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.5" }, { "model": "tru64 unix 5.1b-5", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.0.7" }, { "model": "cognos powerplay", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "jp1/hicommand provisioning manager )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-90" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4" }, { "model": "cosminexus developer standard 06-51-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.25" }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-72(*1)" }, { "model": "ucosminexus application server enterprise 06-70-/l", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "cosminexus application server enterprise 06-51-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server 05-01-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-02" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-20" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.10" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.9" }, { "model": "cognos executive viewer", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.13" }, { "model": "cognos real-time monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "cosminexus server web edition 04-01-/a", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "reflection for secure it windows server sp2", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "7.0" }, { "model": "ucosminexus developer light 06-71-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/integrated management service support", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-08-11-01" }, { "model": "interstage service integrator enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "9.0" }, { "model": "tivoli access manager for e-business", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.1" }, { "model": "jre 27", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.2" }, { "model": "cosminexus developer light 06-00-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tivoli monitoring", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2.1" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-20" }, { "model": "jp1/hicommand global link availability manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-08" }, { "model": "tivoli directory server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.014" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.1-1" }, { "model": "cosminexus developer professional 06-02-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer light", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6" }, { "model": "open-enterprise-server", "scope": "eq", "trust": 0.3, "vendor": "s u s e", "version": "0" }, { "model": "tiered storage manager software (solaris(sp", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "7.1.0-00" }, { "model": "cosminexus application server enterprise 06-50-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.011" }, { "model": "global link manager software", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "6.6-00" }, { "model": "jrockit r27.6.3", "scope": null, "trust": 0.3, "vendor": "oracle", "version": null }, { "model": "cosminexus developer light 06-51-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jdk update14", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "cosminexus application server 05-02-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.5" }, { "model": "tivoli directory server 6.2.0.3-tiv-itds-if0", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "reflection for secure it unix client sp1", "scope": "ne", "trust": 0.3, "vendor": "attachmate", "version": "7.2" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.121" }, { "model": "processing kit for xml 02-05-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "processing kit for xml 02-00-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "enterprise linux desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "cosminexus developer professional 06-51-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server standard 06-70-/o", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server standard 06-72-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50" }, { "model": "device manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1.1-03" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.28" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-20-01" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "replication manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1-00" }, { "model": "device manager software (solaris", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1.1-03(x64))" }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-02" }, { "model": "jp1/hicommand global link availability manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-06" }, { "model": "cosminexus developer standard 06-51-/j", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "it operations analyzer", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "02-53" }, { "model": "jp1/hicommand tuning manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-90" }, { "model": "cognos banking risk performance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10-01" }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-12" }, { "model": "reflection for secure it unix client sp1", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "7.0" }, { "model": "ucosminexus developer standard 06-71-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cics transaction gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.3" }, { "model": "jre 004", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.2" }, { "model": "cosminexus developer standard 06-51-/k", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "virtualcenter update 6a", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "2.5" }, { "model": "websphere datapower xc10 appliance", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.0.0.0" }, { "model": "cosminexus application server enterprise )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-02" }, { "model": "cosminexus developer 05-00-/i", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer professional 06-00-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-10" }, { "model": "tivoli storage productivity center for replication", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "4.2.1.4" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-70" }, { "model": "tiered storage manager software (linux(rhel", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.1-02" }, { "model": "device manager software (linux(rhel", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "7.1.0-00" }, { "model": "cics transaction gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "reflection for the web r3 build", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "2008527" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10-01" }, { "model": "processing kit for xml 02-05-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jre 17", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.3" }, { "model": "cosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6" }, { "model": "tivoli federated identity manager", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "6.2.14" }, { "model": "jre 1.5.0 09", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "jp1/hicommand tuning manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "03-50" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.0.10" }, { "model": "enterprise linux ws extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "jp1/cm2/snmp system observer )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-00" }, { "model": "business availability center", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.55" }, { "model": "jp1/hicommand tiered storage manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "linux enterprise server", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "9" }, { "model": "esx server", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "3.0.3" }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-20" }, { "model": "enterprise linux es extras", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "tivoli netcool performance manager for wireless", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.1.2" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.010" }, { "model": "jp1/hicommand replication monitor", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-90" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-05" }, { "model": "jp1/cm2/network node manager i advanced", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.7" }, { "model": "systems insight manager update", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.31" }, { "model": "cosminexus application server 05-00-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus developer standard 06-71-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.26" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10" }, { "model": "ucosminexus application server standard 06-70-/b )", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer 05-05-/m", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "global link manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.2-01" }, { "model": "sdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4.223" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.123" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-09" }, { "model": "interstage application server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "5.0.1" }, { "model": "ucosminexus application server enterprise 06-72-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-05" }, { "model": "cosminexus application server standard 06-50-/i", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jre 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "ucosminexus operator", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-20-01" }, { "model": "db2 fixpack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.72" }, { "model": "provisioning manager software (linux(sles", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-08" }, { "model": "vcenter update manager update", "scope": "ne", "trust": 0.3, "vendor": "vmware", "version": "4.12" }, { "model": "jdk 05", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "enterprise server", "scope": "eq", "trust": 0.3, "vendor": "mandrakesoft", "version": "5" }, { "model": "ucosminexus application server standard 06-71-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "processing kit for xml 01-05-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/hicommand global link availability manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-09" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-03-03" }, { "model": "cosminexus developer standard 06-00-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer professional 06-51-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.116" }, { "model": "jp1/cm2/network node manager starter ed enterprise solaris", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-00-03" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-20-01" }, { "model": "ucosminexus application server enterprise hp-ux", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10-01" }, { "model": "cosminexus client 06-02-/g", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jdk update16", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "jp1/cm2/network node manager starter edition )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "25008-00" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-09" }, { "model": "tiered storage manager software (linux(sles", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.0-00" }, { "model": "ucosminexus application server standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-09" }, { "model": "tiered storage manager software (linux(sles", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-08" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.3" }, { "model": "sdk .0 01", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.4" }, { "model": "cosminexus developer professional 06-50-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus developer", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-00" }, { "model": "device manager software (linux(sles", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.0.1-02" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.0.4" }, { "model": "tuning manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.2-01" }, { "model": "cosminexus developer light 06-00-/h", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tivoli netcool performance manager", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3.1" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.020" }, { "model": "enterprise linux as for sap", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "4" }, { "model": "cosminexus studio", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "5" }, { "model": "db2 fixpak", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.54" }, { "model": "cosminexus developer standard 06-02-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "device manager software (solaris", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1-03(x64))" }, { "model": "cosminexus developer standard 06-51-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-51" }, { "model": "tivoli composite application manager for websphere", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.2" }, { "model": "system storage ds8700", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "0" }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-10" }, { "model": "cosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-00" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.33" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-20-02" }, { "model": "cosminexus studio web edition", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-04-00" }, { "model": "interstage service integrator enterprise edition 9.0.0a", "scope": null, "trust": 0.3, "vendor": "fujitsu", "version": null }, { "model": "cosminexus application server standard 06-51-/i", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tivoli directory server 6.3.0.0-tiv-itds-if0", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": null }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.05" }, { "model": "jp1/hicommand global link availability manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "cosminexus studio", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-00" }, { "model": "jre .0 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0" }, { "model": "cosminexus developer standard 06-00-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cognos business viewpoint", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "10.0" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.113" }, { "model": "websphere datapower xc10 appliance", "scope": "ne", "trust": 0.3, "vendor": "ibm", "version": "1.0.0.5" }, { "model": "cosminexus application server enterprise 06-51-/b (linux(", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-03-03" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.14" }, { "model": "tivoli integrated portal", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.1.114" }, { "model": "systems insight manager sp2", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.0" }, { "model": "jdk 19", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "cosminexus developer professional 06-50-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server 05-01-/i", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "interstage software quality analyzer 10.0.0a", "scope": null, "trust": 0.3, "vendor": "fujitsu", "version": null }, { "model": "cosminexus application server standard )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-02" }, { "model": "ucosminexus developer professional", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-20-02" }, { "model": "cognos tm1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.0" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-00-05" }, { "model": "cosminexus application server 05-00-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "it operations analyzer", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "02-53-01" }, { "model": "cosminexus developer professional 06-50-/e", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/integrated management service support", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-0" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.0.15" }, { "model": "jdk 003", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.1.8" }, { "model": "cosminexus application server 05-01-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cognos decisionstream", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-10-01" }, { "model": "jp1/hicommand replication monitor", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-60" }, { "model": "jp1/hicommand tuning manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-00" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.0.34" }, { "model": "jp1/automatic job management system web operation assistant", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "2-0" }, { "model": "cosminexus application server 05-01-/l", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "infosphere information server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.25" }, { "model": "jre 19", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.0.1" }, { "model": "ucosminexus application server standard 06-70-/j", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "reflection for secure it windows server", "scope": "eq", "trust": 0.3, "vendor": "attachmate", "version": "6.0" }, { "model": "cosminexus application server", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-02" }, { "model": "tuning manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "7.001" }, { "model": "rational clearquest", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.13" }, { "model": "cics transaction gateway", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1" }, { "model": "cosminexus application server 05-00-/o", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server 05-00-/h", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tuning manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.402" }, { "model": "tuning manager software )", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.0" }, { "model": "systems insight manager sp6", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.0" }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-20-01" }, { "model": "jdk update", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.6.016" }, { "model": "cognos business intelligence", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "network node manager i", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "9.00" }, { "model": "ucosminexus service architect", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-03-03" }, { "model": "ucosminexus developer light 06-71-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server enterprise 06-51-/j", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/cm2/network node manager starter edition pa-risc", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "25008-00-03" }, { "model": "websphere application server", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.1.1" }, { "model": "jdk 1.5.0 07-b03", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "cosminexus application server standard 06-51-/b (linux(", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server standard 06-50-/b )", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "mac os server", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.6.1" }, { "model": "interstage application server standard-j edition", "scope": "eq", "trust": 0.3, "vendor": "fujitsu", "version": "8.0.2" }, { "model": "jre 16", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.1" }, { "model": "jp1/cm2/network node manager starter ed enterprise (hp-ux(pa-risc", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "08-00" }, { "model": "cosminexus application server 05-05-/n", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.8" }, { "model": "jp1/hicommand global link availability manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-07" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "7.0.6" }, { "model": "ucosminexus service platform", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "jboss enterprise portal platform 4.3.cp06", "scope": null, "trust": 0.3, "vendor": "redhat", "version": null }, { "model": "ucosminexus developer standard", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "06-70" }, { "model": "enterprise linux sap", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "6" }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "1.3" }, { "model": "jp1/hicommand provisioning manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "0" }, { "model": "cosminexus developer standard 06-02-/a", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server 05-05-/p", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jp1/hicommand replication monitor", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-50" }, { "model": "jre 03", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3" }, { "model": "tivoli netview", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.5" }, { "model": "cosminexus developer professional 06-51-/b", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tivoli common reporting", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "2.1" }, { "model": "openvms secure web server", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "7.2-2" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.0" }, { "model": "cosminexus application server enterprise 06-51-/f", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus application server 05-00-/k", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "replication manager software", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.1-01" }, { "model": "cosminexus developer 05-05-/k", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "cosminexus server web edition", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-04-00" }, { "model": "jp1/hicommand global link availability manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "05-04" }, { "model": "cosminexus developer light 06-50-/d", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "mac os", "scope": "eq", "trust": 0.3, "vendor": "apple", "version": "x10.5.1" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.29" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.2.1" }, { "model": "jdk update22", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "rational clearcase", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.1.1.4" }, { "model": "ucosminexus application server enterprise", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-09" }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.109" }, { "model": "jdk update15", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.5.0" }, { "model": "systems insight manager", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "6.3" }, { "model": "linux amd64", "scope": "eq", "trust": 0.3, "vendor": "debian", "version": "5.0" }, { "model": "cosminexus developer 05-01-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "6.0.11" }, { "model": "jboss enterprise web platform for rhel 4es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "cosminexus developer 05-01-/e", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "jdk", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "1.3.110" }, { "model": "enterprise linux desktop workstation client", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5" }, { "model": "provisioning manager software (solaris(sp", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "6.4.0-08" }, { "model": "jdk 1.4.2 10", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "cosminexus developer standard 06-02-/c", "scope": null, "trust": 0.3, "vendor": "hitachi", "version": null }, { "model": "esx update", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.11" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.0.28" }, { "model": "device manager software (solaris", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "6.2-00(x64))" }, { "model": "tomcat", "scope": "eq", "trust": 0.3, "vendor": "apache", "version": "5.5.10" }, { "model": "db2 fixpack", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "9.57" }, { "model": "it operations analyzer", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "02-01" }, { "model": "linux arm", "scope": "eq", "trust": 0.3, "vendor": "ubuntu", "version": "9.10" }, { "model": "ucosminexus client", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "07-50-01" } ], "sources": [ { "db": "BID", "id": "46091" }, { "db": "JVNDB", "id": "JVNDB-2011-000018" }, { "db": "JVNDB", "id": "JVNDB-2011-000017" }, { "db": "JVNDB", "id": "JVNDB-2011-001185" }, { "db": "NVD", "id": "CVE-2010-4476" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_22:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:*:update_23:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.6.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_22:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:*:update_23:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.6.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update26:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:*:update27:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update25:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.4.2_29", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:*:update27:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.4.2_29", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2010-4476" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "HP", "sources": [ { "db": "PACKETSTORM", "id": "121037" }, { "db": "PACKETSTORM", "id": "114812" }, { "db": "PACKETSTORM", "id": "101334" }, { "db": "PACKETSTORM", "id": "100414" }, { "db": "PACKETSTORM", "id": "112826" } ], "trust": 0.5 }, "cve": "CVE-2010-4476", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2010-4476", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.9, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "IPA", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2011-000018", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "IPA", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "JVNDB-2011-000017", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2010-4476", "trust": 1.8, "value": "MEDIUM" }, { "author": "IPA", "id": "JVNDB-2011-000018", "trust": 0.8, "value": "Medium" }, { "author": "IPA", "id": "JVNDB-2011-000017", "trust": 0.8, "value": "Medium" }, { "author": "VULMON", "id": "CVE-2010-4476", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULMON", "id": "CVE-2010-4476" }, { "db": "JVNDB", "id": "JVNDB-2011-000018" }, { "db": "JVNDB", "id": "JVNDB-2011-000017" }, { "db": "JVNDB", "id": "JVNDB-2011-001185" }, { "db": "NVD", "id": "CVE-2010-4476" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308. IBM WebSphere Application Server (WAS) contains a denial-of-service (DoS) vulnerability. IBM WebSphere Application Server contains a denial-of-service (DoS) vulnerability due to an issue in Java Runtime Environment (JRE). According to the developer: \" For other IBM software products that contain an affected version of WAS, require an update. Specifically, WebSphere Process Server (WPS), WebSphere Enterprise Service Bus (WESB), WebSphere Virtual Enterprise (WVE), WebSphere Commerce and others are applicable. Also, IBM HTTP Server is not affected by this vulnerability.\"A remote attacker may cause a denial-of-service (DoS). plural Oracle Product Java Runtime Environment Components include Java language and APIs There are vulnerabilities that affect availability due to flaws in the handling of.Service disruption by a third party (DoS) An attack may be carried out. Oracle Java is prone to a remote denial-of-service vulnerability. \nSuccessful attacks will cause applications written in Java to hang, creating a denial-of-service condition. \nThis issue affects both the Java compiler and Runtime Environment. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201111-02\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n Title: Oracle JRE/JDK: Multiple vulnerabilities\n Date: November 05, 2011\n Bugs: #340421, #354213, #370559, #387851\n ID: 201111-02\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in the Oracle JRE/JDK,\nallowing attackers to cause unspecified impact. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 dev-java/sun-jre-bin \u003c 1.6.0.29 \u003e= 1.6.0.29 *\n 2 app-emulation/emul-linux-x86-java\n \u003c 1.6.0.29 \u003e= 1.6.0.29 *\n 3 dev-java/sun-jdk \u003c 1.6.0.29 \u003e= 1.6.0.29 *\n -------------------------------------------------------------------\n NOTE: Packages marked with asterisks require manual intervention!\n -------------------------------------------------------------------\n 3 affected packages\n -------------------------------------------------------------------\n\nDescription\n===========\n\nMultiple vulnerabilities have been reported in the Oracle Java\nimplementation. Please review the CVE identifiers referenced below and\nthe associated Oracle Critical Patch Update Advisory for details. \n\nImpact\n======\n\nA remote attacker could exploit these vulnerabilities to cause\nunspecified impact, possibly including remote execution of arbitrary\ncode. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Oracle JDK 1.6 users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-java/sun-jdk-1.6.0.29\"\n\nAll Oracle JRE 1.6 users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=dev-java/sun-jre-bin-1.6.0.29\"\n\nAll users of the precompiled 32-bit Oracle JRE 1.6 should upgrade to\nthe latest version:\n\n # emerge --sync\n # emerge -a -1 -v \"\u003e=app-emulation/emul-linux-x86-java-1.6.0.29\"\n\nNOTE: As Oracle has revoked the DLJ license for its Java\nimplementation, the packages can no longer be updated automatically. \nThis limitation is not present on a non-fetch restricted implementation\nsuch as dev-java/icedtea-bin. \n\nReferences\n==========\n\n[ 1 ] CVE-2010-3541\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3541\n[ 2 ] CVE-2010-3548\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3548\n[ 3 ] CVE-2010-3549\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3549\n[ 4 ] CVE-2010-3550\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3550\n[ 5 ] CVE-2010-3551\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3551\n[ 6 ] CVE-2010-3552\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3552\n[ 7 ] CVE-2010-3553\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3553\n[ 8 ] CVE-2010-3554\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3554\n[ 9 ] CVE-2010-3555\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3555\n[ 10 ] CVE-2010-3556\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3556\n[ 11 ] CVE-2010-3557\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3557\n[ 12 ] CVE-2010-3558\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3558\n[ 13 ] CVE-2010-3559\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3559\n[ 14 ] CVE-2010-3560\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3560\n[ 15 ] CVE-2010-3561\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3561\n[ 16 ] CVE-2010-3562\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3562\n[ 17 ] CVE-2010-3563\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3563\n[ 18 ] CVE-2010-3565\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3565\n[ 19 ] CVE-2010-3566\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3566\n[ 20 ] CVE-2010-3567\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3567\n[ 21 ] CVE-2010-3568\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3568\n[ 22 ] CVE-2010-3569\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3569\n[ 23 ] CVE-2010-3570\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3570\n[ 24 ] CVE-2010-3571\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3571\n[ 25 ] CVE-2010-3572\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3572\n[ 26 ] CVE-2010-3573\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3573\n[ 27 ] CVE-2010-3574\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3574\n[ 28 ] CVE-2010-4422\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4422\n[ 29 ] CVE-2010-4447\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4447\n[ 30 ] CVE-2010-4448\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4448\n[ 31 ] CVE-2010-4450\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4450\n[ 32 ] CVE-2010-4451\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4451\n[ 33 ] CVE-2010-4452\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4452\n[ 34 ] CVE-2010-4454\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4454\n[ 35 ] CVE-2010-4462\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4462\n[ 36 ] CVE-2010-4463\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4463\n[ 37 ] CVE-2010-4465\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4465\n[ 38 ] CVE-2010-4466\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4466\n[ 39 ] CVE-2010-4467\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4467\n[ 40 ] CVE-2010-4468\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4468\n[ 41 ] CVE-2010-4469\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4469\n[ 42 ] CVE-2010-4470\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4470\n[ 43 ] CVE-2010-4471\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4471\n[ 44 ] CVE-2010-4472\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4472\n[ 45 ] CVE-2010-4473\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4473\n[ 46 ] CVE-2010-4474\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4474\n[ 47 ] CVE-2010-4475\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4475\n[ 48 ] CVE-2010-4476\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4476\n[ 49 ] CVE-2011-0802\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0802\n[ 50 ] CVE-2011-0814\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0814\n[ 51 ] CVE-2011-0815\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0815\n[ 52 ] CVE-2011-0862\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0862\n[ 53 ] CVE-2011-0863\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0863\n[ 54 ] CVE-2011-0864\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0864\n[ 55 ] CVE-2011-0865\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0865\n[ 56 ] CVE-2011-0867\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0867\n[ 57 ] CVE-2011-0868\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0868\n[ 58 ] CVE-2011-0869\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0869\n[ 59 ] CVE-2011-0871\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0871\n[ 60 ] CVE-2011-0872\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0872\n[ 61 ] CVE-2011-0873\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0873\n[ 62 ] CVE-2011-3389\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389\n[ 63 ] CVE-2011-3516\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3516\n[ 64 ] CVE-2011-3521\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3521\n[ 65 ] CVE-2011-3544\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3544\n[ 66 ] CVE-2011-3545\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3545\n[ 67 ] CVE-2011-3546\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3546\n[ 68 ] CVE-2011-3547\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3547\n[ 69 ] CVE-2011-3548\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3548\n[ 70 ] CVE-2011-3549\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3549\n[ 71 ] CVE-2011-3550\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3550\n[ 72 ] CVE-2011-3551\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3551\n[ 73 ] CVE-2011-3552\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3552\n[ 74 ] CVE-2011-3553\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3553\n[ 75 ] CVE-2011-3554\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3554\n[ 76 ] CVE-2011-3555\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3555\n[ 77 ] CVE-2011-3556\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3556\n[ 78 ] CVE-2011-3557\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3557\n[ 79 ] CVE-2011-3558\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3558\n[ 80 ] CVE-2011-3560\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3560\n[ 81 ] CVE-2011-3561\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3561\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201111-02.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2011 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n. \n\nBackground\n==========\n\nIcedTea is a distribution of the Java OpenJDK source code built with\nfree build tools. \n\nNNMi Version / Operating System\n Required Patch\n Hotfix\n\n9.1x HP-UX\n Patch 4\n Hotfix-NNMi-9.1xP4-HP-UX-JDK-20120710.zip\n\n9.1x Linux\n Patch 4\n Hotfix-NNMi-9.1xP4-Linux-JDK-20120523.zip\n\n9.1x Solaris\n Patch 4\n Hotfix-NNMi-9.1xP4-Solaris-JDK-20120523.zip\n\n9.1x Windows\n Patch 4\n Hotfix-NNMi-9.1xP4-Windows-JDK-20120523.zip\n\nNote: The hotfix must be installed after the required patch. The hotfix must\nbe reinstalled if the required patch is reinstalled. \n\nMANUAL ACTIONS: Yes - Update\n\nInstall the applicable patch and hotfix. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. Summary:\n\nUpdated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Network Satellite 5.4.1 for Red Hat\nEnterprise Linux 5. \n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Network Satellite Server 5.4 (RHEL v.5) - i386, s390x, x86_64\n\n3. In\na typical operating environment, these are of low security risk as the\nruntime is not used on untrusted applets. Detailed vulnerability descriptions are linked from the IBM\n\"Security alerts\" page, listed in the References section. (CVE-2009-3555,\nCVE-2010-1321, CVE-2010-3541, CVE-2010-3548, CVE-2010-3549, CVE-2010-3550,\nCVE-2010-3551, CVE-2010-3553, CVE-2010-3555, CVE-2010-3556, CVE-2010-3557,\nCVE-2010-3558, CVE-2010-3560, CVE-2010-3562, CVE-2010-3563, CVE-2010-3565,\nCVE-2010-3566, CVE-2010-3568, CVE-2010-3569, CVE-2010-3571, CVE-2010-3572,\nCVE-2010-3573, CVE-2010-3574, CVE-2010-4422, CVE-2010-4447, CVE-2010-4448,\nCVE-2010-4452, CVE-2010-4454, CVE-2010-4462, CVE-2010-4463, CVE-2010-4465,\nCVE-2010-4466, CVE-2010-4467, CVE-2010-4468, CVE-2010-4471, CVE-2010-4473,\nCVE-2010-4475, CVE-2010-4476)\n\nUsers of Red Hat Network Satellite 5.4.1 are advised to upgrade to these\nupdated java-1.6.0-ibm packages, which contain the IBM 1.6.0 SR9-FP1 Java\nrelease. For this update to take effect, Red Hat Network Satellite must be\nrestarted. Refer to the Solution section for details. \n\n4. Solution:\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart\n\n5. Bugs fixed (http://bugzilla.redhat.com/):\n\n533125 - CVE-2009-3555 TLS: MITM attacks via session renegotiation\n582466 - CVE-2010-1321 krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005)\n639876 - CVE-2010-3568 OpenJDK Deserialization Race condition (6559775)\n639897 - CVE-2010-3562 OpenJDK IndexColorModel double-free (6925710)\n639904 - CVE-2010-3557 OpenJDK Swing mutable static (6938813)\n639909 - CVE-2010-3548 OpenJDK DNS server IP address information leak (6957564)\n639920 - CVE-2010-3565 OpenJDK JPEG writeImage remote code execution (6963023)\n639922 - CVE-2010-3566 OpenJDK ICC Profile remote code execution (6963489)\n639925 - CVE-2010-3569 OpenJDK Serialization inconsistencies (6966692)\n642167 - CVE-2010-3553 OpenJDK Swing unsafe reflection usage (6622002)\n642180 - CVE-2010-3549 OpenJDK HttpURLConnection request splitting (6952017)\n642187 - CVE-2010-3551 OpenJDK local network address disclosure (6952603)\n642202 - CVE-2010-3541 CVE-2010-3573 OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004)\n642215 - CVE-2010-3574 OpenJDK HttpURLConnection incomplete TRACE permission check (6981426)\n642558 - CVE-2010-3555 JDK unspecified vulnerability in Deployment component\n642559 - CVE-2010-3550 JDK unspecified vulnerability in Java Web Start component\n642573 - CVE-2010-3560 JDK unspecified vulnerability in Networking component\n642576 - CVE-2010-3556 JDK unspecified vulnerability in 2D component\n642585 - CVE-2010-3571 JDK unspecified vulnerability in 2D component\n642589 - CVE-2010-3563 JDK unspecified vulnerability in Deployment component\n642593 - CVE-2010-3558 JDK unspecified vulnerability in Java Web Start component\n642611 - CVE-2010-3572 JDK unspecified vulnerability in Sound component\n674336 - CVE-2010-4476 JDK Double.parseDouble Denial-Of-Service\n675984 - CVE-2010-4465 OpenJDK Swing timer-based security manager bypass (6907662)\n676019 - CVE-2010-4471 OpenJDK Java2D font-related system property leak (6985453)\n676023 - CVE-2010-4448 OpenJDK DNS cache poisoning by untrusted applets (6981922)\n677957 - CVE-2010-4475 JDK unspecified vulnerability in Deployment component\n677958 - CVE-2010-4473 JDK unspecified vulnerability in Sound component\n677959 - CVE-2010-4468 JDK unspecified vulnerability in JDBC component\n677960 - CVE-2010-4467 JDK unspecified vulnerability in Deployment component\n677961 - CVE-2010-4466 JDK unspecified vulnerability in Deployment component\n677963 - CVE-2010-4463 JDK unspecified vulnerability in Deployment component\n677966 - CVE-2010-4462 JDK unspecified vulnerability in Sound component\n677967 - CVE-2010-4454 JDK unspecified vulnerability in Sound component\n677968 - CVE-2010-4452 JDK unspecified vulnerability in Deployment component\n677970 - CVE-2010-4447 JDK unspecified vulnerability in Deployment component\n677971 - CVE-2010-4422 JDK unspecified vulnerability in Deployment component\n\n6. Package List:\n\nRed Hat Network Satellite Server 5.4 (RHEL v.5):\n\nSource:\nftp://ftp.redhat.com/pub/redhat/linux/enterprise/5Server/en/RHNSAT/SRPMS/java-1.6.0-ibm-1.6.0.9.1-1jpp.1.el5.src.rpm\n\ni386:\njava-1.6.0-ibm-1.6.0.9.1-1jpp.1.el5.i386.rpm\njava-1.6.0-ibm-devel-1.6.0.9.1-1jpp.1.el5.i386.rpm\n\ns390x:\njava-1.6.0-ibm-1.6.0.9.1-1jpp.1.el5.s390x.rpm\njava-1.6.0-ibm-devel-1.6.0.9.1-1jpp.1.el5.s390x.rpm\n\nx86_64:\njava-1.6.0-ibm-1.6.0.9.1-1jpp.1.el5.x86_64.rpm\njava-1.6.0-ibm-devel-1.6.0.9.1-1jpp.1.el5.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and \ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2009-3555.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-1321.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-3541.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-3548.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-3549.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-3550.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-3551.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-3553.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-3555.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-3556.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-3557.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-3558.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-3560.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-3562.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-3563.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-3565.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-3566.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-3568.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-3569.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-3571.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-3572.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-3573.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-3574.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-4422.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-4447.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-4448.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-4452.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-4454.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-4462.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-4463.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-4465.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-4466.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-4467.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-4468.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-4471.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-4473.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-4475.html\nhttps://www.redhat.com/security/data/cve/CVE-2010-4476.html\nhttps://access.redhat.com/security/updates/classification/#low\nhttp://www.ibm.com/developerworks/java/jdk/alerts/\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2011 Red Hat, Inc. \n\nFor more information see vulnerability #1 in:\nSA43262\n\nPlease see the vendor\u0027s advisory for the list of affected products. \n\nSOLUTION:\nUpdate to a fixed version. Please see the vendor\u0027s advisory for more\ndetails. ----------------------------------------------------------------------\n\n\nGet a tax break on purchases of Secunia Solutions!\n\nIf you are a U.S. company, you may be qualified for a tax break for your software purchases. Learn more at:\nhttp://secunia.com/products/corporate/vim/section_179/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nSun Java JDK / JRE / SDK \"doubleValue()\" Denial of Service\nVulnerability\n\nSECUNIA ADVISORY ID:\nSA43262\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/43262/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43262\n\nRELEASE DATE:\n2011-02-09\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/43262/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/43262/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43262\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nKonstantin Preiber has reported a vulnerability in Sun Java, which\ncan be exploited by malicious people to cause a DoS (Denial of\nService). \n\nThe vulnerability is caused due to an error in the \"doubleValue()\"\nmethod in FloatingDecimal.java when converting\n\"2.2250738585072012e-308\" from a string type to a double precision\nbinary floating point and can be exploited to cause an infinite\nloop. \n* Sun JDK 5.0 Update 27 and prior. \n* Sun SDK 1.4.2_29 and prior. \n\nSOLUTION:\nApply patch via the FPUpdater tool. \n\nPROVIDED AND/OR DISCOVERED BY:\nKonstantin Preiber\n\nORIGINAL ADVISORY:\nOracle:\nhttp://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html\n\nKonstantin Preiber:\nhttp://www.exploringbinary.com/why-volatile-fixes-the-2-2250738585072011e-308-bug/comment-page-1/#comment-4645\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c02746026\nVersion: 1\n\nHPSBUX02642 SSRT100415 rev.1 - HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows running Java, Remote Denial of Service (DoS)\n\nNOTICE: The information in this Security Bulletin should be acted upon as soon as possible. \n\nRelease Date: 2011-04-12\nLast Updated: 2011-04-12\n\nPotential Security Impact: Remote Denial of Service (DoS)\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential vulnerability has been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows running Java. The vulnerability could be remotely exploited to create a Denial of Service (DoS). \n\nReferences: CVE-2010-4476\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nAny version of Java running on HP Network Node Manager i (NNMi) v8.1x and v9.0x for HP-UX, Linux, Solaris, and Windows\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2010-4476 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has made two methods available to resolve the vulnerability. Customers can request hotfixes or use the FPupdater tool. \n\nHotfixes\n\nCustomers can request the following hotfixes by contacting the normal HP Services support channel. \n\nNNMi Version\n JDK\n Hotfix Number\n\nNNMi 9.0x\n JDK b\n QCCR1B87492\n\nNNMi 9.0x\n JDK nnm\n QCCR1B87433\n\nNNMi 8.1x\n JDK b\n QCCR1B87492\n\nNNMi 8.1x\n JDK nnm (nms on Windows)\n QCCR1B87491\n\nFPUpdater (Floating Point Updater)\n\nThe FPupdater tool can be used instead of applying hotfixes. \n\nTo download the FPUpdater tool, go to https://www.hp.com/go/java then click on the link for the FPUpdater tool\n\nNote: NNMi has two JDKs to be updated. Before running the FPUpdater tool set the shell environment variable JRE_HOME as follows:\n\nNNMi Version\n JDK\n JRE_HOME for HP-UX, Linux, Solaris\n JRE_HOME for Windows\n\nNNMi 9.x\n JDK b\n /opt/OV/nonOV/jdk/b/jre\n {install_dir}\\nonOV\\jdk\\b\\jre\n\nNNMi 9.x\n JDK nnm\n /opt/OV/nonOV/jdk/nnm/jre\n {install_dir}\\nonOV\\jdk\\nnm\\jre\n\nNNMi 8.1x\n JDK b\n /opt/OV/nonOV/jdk/b/jre\n {install_dir}\\nonOV\\jdk\\b\\jre\n\nNNMi 8.1x\n JDK nnm (nms on Windows)\n /opt/OV/nonOV/jdk/nnm/jre\n {install_dir}\\nonOV\\jdk\\nms\\jre\n\nMANUAL ACTIONS: Yes - Update\n\nInstall the appropriate hotfix or update using FPUpdater\n\nPRODUCT SPECIFIC INFORMATION\n\nHP-UX Software Assistant: HP-UX Software Assistant is an enhanced application that replaces HP-UX Security Patch Check. It analyzes all Security Bulletins issued by HP and lists recommended actions that may apply to a specific HP-UX system. It can also download patches and create a depot automatically. For more information see: https://www.hp.com/go/swa\n\nThe following text is for use by the HP-UX Software Assistant. \n\nAFFECTED VERSIONS (for HP-UX)\n\nFor HP-UX NNM 8.x and v9.x\n\nHP-UX B.11.31\nHP-UX B.11.23 (IA)\n=============\nHPOvNNM.HPNMSJBOSS\naction: install the appropriate hotfix or update using FPUpdater\n\nEND AFFECTED VERSIONS (for HP-UX)\n\nHISTORY\nVersion:1 (rev.1) - 12 April 2011 Initial release\n\nThird Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer\u0027s patch management policy. \n\nSupport: For further information, contact normal HP Services support channel. \n\nReport: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com\nIt is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. \nTo get the security-alert PGP key, please send an e-mail message as follows:\n To: security-alert@hp.com\n Subject: get key\nSubscribe: To initiate a subscription to receive future HP Security Bulletins via Email:\nhttp://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA\u0026langcode=USENG\u0026jumpid=in_SC-GEN__driverITRC\u0026topiccode=ITRC\nOn the web page: ITRC security bulletins and patch sign-up\nUnder Step1: your ITRC security bulletins and patches\n -check ALL categories for which alerts are required and continue. \nUnder Step2: your ITRC operating systems\n -verify your operating system selections are checked and save. \n\nTo update an existing subscription: http://h30046.www3.hp.com/subSignIn.php\nLog in on the web page: Subscriber\u0027s choice for Business: sign-in. \nOn the web page: Subscriber\u0027s Choice: your profile summary - use Edit Profile to update appropriate sections. \n\nTo review previously published Security Bulletins visit: http://www.itrc.hp.com/service/cki/secBullArchive.do\n\n* The Software Product Category that this Security Bulletin\nrelates to is represented by the 5th and 6th characters\nof the Bulletin number in the title:\n\nGN = HP General SW\nMA = HP Management Agents\nMI = Misc. 3rd Party SW\nMP = HP MPE/iX\nNS = HP NonStop Servers\nOV = HP OpenVMS\nPI = HP Printing \u0026 Imaging\nST = HP Storage SW\nTL = HP Trusted Linux\nTU = HP Tru64 UNIX\nUX = HP-UX\nVV = HP VirtualVault\n\nSystem management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. \n\n\"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user\u0027s use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement.\"\n\nCopyright 2009 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided \"as is\" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits;damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.10 (GNU/Linux)\n\niEYEARECAAYFAk2kX5sACgkQ4B86/C0qfVnGRwCgot7NFjfw2O2zBn2uPX3Q/SVW\nAewAoNWFcOq802uOl0MpL1CHVvxYZMNf\n=g6I8\n-----END PGP SIGNATURE-----\n. \nThe updates are available from: http://www.hp.com/go/java\n\nThese issues are addressed in the following versions of the HP Java:\n\nHP-UX B.11.11 / SDK and JRE v1.4.2.28 or subsequent\n\nHP-UX B.11.23 / SDK and JRE v1.4.2.28 or subsequent\n\nHP-UX B.11.31 / SDK and JRE v1.4.2.28 or subsequent\n\nMANUAL ACTIONS: Yes - Update\n\nFor Java v1.4.2.27 and earlier, update to Java v1.4.2.28 or subsequent", "sources": [ { "db": "NVD", "id": "CVE-2010-4476" }, { "db": "JVNDB", "id": "JVNDB-2011-000018" }, { "db": "JVNDB", "id": "JVNDB-2011-000017" }, { "db": "JVNDB", "id": "JVNDB-2011-001185" }, { "db": "BID", "id": "46091" }, { "db": "VULMON", "id": "CVE-2010-4476" }, { "db": "PACKETSTORM", "id": "121037" }, { "db": "PACKETSTORM", "id": "106640" }, { "db": "PACKETSTORM", "id": "127267" }, { "db": "PACKETSTORM", "id": "114812" }, { "db": "PACKETSTORM", "id": "102374" }, { "db": "PACKETSTORM", "id": "101468" }, { "db": "PACKETSTORM", "id": "101334" }, { "db": "PACKETSTORM", "id": "98322" }, { "db": "PACKETSTORM", "id": "100414" }, { "db": "PACKETSTORM", "id": "112826" } ], "trust": 4.32 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=35304", "trust": 0.1, "type": "exploit" } ], "sources": [ { "db": "VULMON", "id": "CVE-2010-4476" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2010-4476", "trust": 4.7 }, { "db": "SECUNIA", "id": "43295", "trust": 2.7 }, { "db": "SECTRACK", "id": "1025062", "trust": 2.7 }, { "db": "SECUNIA", "id": "43304", "trust": 1.9 }, { "db": "SECUNIA", "id": "43280", "trust": 1.9 }, { "db": "JVN", "id": "JVN97334690", "trust": 1.6 }, { "db": "JVN", "id": "JVN26301278", "trust": 1.6 }, { "db": "HITACHI", "id": "HS11-003", "trust": 1.4 }, { "db": "BID", "id": "46091", "trust": 1.2 }, { "db": "SECUNIA", "id": "43400", "trust": 1.1 }, { "db": "SECUNIA", "id": "45022", "trust": 1.1 }, { "db": "SECUNIA", "id": "43333", "trust": 1.1 }, { "db": "SECUNIA", "id": "43048", "trust": 1.1 }, { "db": "SECUNIA", "id": "44954", "trust": 1.1 }, { "db": "SECUNIA", "id": "45555", "trust": 1.1 }, { "db": "SECUNIA", "id": "43659", "trust": 1.1 }, { "db": "SECUNIA", "id": "43378", "trust": 1.1 }, { "db": "SECUNIA", "id": "49198", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2011-0605", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2011-0422", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2011-0434", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2011-0365", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2011-0377", "trust": 1.1 }, { "db": "VUPEN", "id": "ADV-2011-0379", "trust": 1.1 }, { "db": "SECUNIA", "id": "43262", "trust": 1.0 }, { "db": "JVNDB", "id": "JVNDB-2011-000018", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2011-000017", "trust": 0.8 }, { "db": "JVN", "id": "JVN16308183", "trust": 0.8 }, { "db": "SECUNIA", "id": "44303", "trust": 0.8 }, { "db": "SECUNIA", "id": "43194", "trust": 0.8 }, { "db": "SECUNIA", "id": "43198", "trust": 0.8 }, { "db": "VUPEN", "id": "ADV-2011-0405", "trust": 0.8 }, { "db": "VUPEN", "id": "ADV-2011-0339", "trust": 0.8 }, { "db": "VUPEN", "id": "ADV-2011-1051", "trust": 0.8 }, { "db": "VUPEN", "id": "ADV-2011-0294", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2011-001185", "trust": 0.8 }, { "db": "HITACHI", "id": "HS11-008", "trust": 0.4 }, { "db": "HITACHI", "id": "HS11-009", "trust": 0.3 }, { "db": "HITACHI", "id": "HS11-010", "trust": 0.3 }, { "db": "SECUNIA", "id": "44576", "trust": 0.2 }, { "db": "EXPLOIT-DB", "id": "35304", "trust": 0.1 }, { "db": "VULMON", "id": "CVE-2010-4476", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "121037", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "106640", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "127267", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "114812", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "102374", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "101468", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "101334", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "98322", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "100414", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "112826", "trust": 0.1 } ], "sources": [ { "db": "VULMON", "id": "CVE-2010-4476" }, { "db": "BID", "id": "46091" }, { "db": "JVNDB", "id": "JVNDB-2011-000018" }, { "db": "JVNDB", "id": "JVNDB-2011-000017" }, { "db": "JVNDB", "id": "JVNDB-2011-001185" }, { "db": "PACKETSTORM", "id": "121037" }, { "db": "PACKETSTORM", "id": "106640" }, { "db": "PACKETSTORM", "id": "127267" }, { "db": "PACKETSTORM", "id": "114812" }, { "db": "PACKETSTORM", "id": "102374" }, { "db": "PACKETSTORM", "id": "101468" }, { "db": "PACKETSTORM", "id": "101334" }, { "db": "PACKETSTORM", "id": "98322" }, { "db": "PACKETSTORM", "id": "100414" }, { "db": "PACKETSTORM", "id": "112826" }, { "db": "NVD", "id": "CVE-2010-4476" } ] }, "id": "VAR-201102-0280", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.30688400400000004 }, "last_update_date": "2024-07-22T22:50:51.905000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HPSBMU02769 SSRT100846", "trust": 2.4, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03298151" }, { "title": "NV18-002", "trust": 2.4, "url": "http://jpn.nec.com/security-info/secinfo/nv18-002.html" }, { "title": "1462019", "trust": 1.6, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21462019" }, { "title": "1462146", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21462146" }, { "title": "1462136", "trust": 0.8, "url": "http://www.ibm.com/support/docview.wss?uid=swg21462136" }, { "title": "PM31983", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1pm31983" }, { "title": "IZ94423", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1iz94423" }, { "title": "security-5.html#Not_a_vulnerability_in_Tomcat", "trust": 0.8, "url": "http://tomcat.apache.org/security-5.html#not_a_vulnerability_in_tomcat" }, { "title": "security-6.html#Not_a_vulnerability_in_Tomcat", "trust": 0.8, "url": "http://tomcat.apache.org/security-6.html#not_a_vulnerability_in_tomcat" }, { "title": "security-7.html#Not_a_vulnerability_in_Tomcat", "trust": 0.8, "url": "http://tomcat.apache.org/security-7.html#not_a_vulnerability_in_tomcat" }, { "title": "1066244", "trust": 0.8, "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066244" }, { "title": "1066315", "trust": 0.8, "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066315" }, { "title": "1066318", "trust": 0.8, "url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1066318" }, { "title": "HT4562", "trust": 0.8, "url": "http://support.apple.com/kb/ht4562" }, { "title": "HT4563", "trust": 0.8, "url": "http://support.apple.com/kb/ht4563" }, { "title": "HT4562", "trust": 0.8, "url": "http://support.apple.com/kb/ht4562?viewlocale=ja_jp" }, { "title": "HT4563", "trust": 0.8, "url": "http://support.apple.com/kb/ht4563?viewlocale=ja_jp" }, { "title": "tomcat5-5.5.23-0jpp.17.0.1.AXS3", "trust": 0.8, "url": "https://tsn.miraclelinux.com/tsn_local/index.php?m=errata\u0026a=detail\u0026eid=1382" }, { "title": "HPUXWSATW233", "trust": 0.8, "url": "https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber=hpuxwsatw233" }, { "title": "HPUXWSATW315", "trust": 0.8, "url": "https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber=hpuxwsatw315" }, { "title": "HS11-008", "trust": 0.8, "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs11-008/index.html" }, { "title": "HS11-009", "trust": 0.8, "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs11-009/index.html" }, { "title": "HS11-010", "trust": 0.8, "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs11-010/index.html" }, { "title": "HS11-003", "trust": 0.8, "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs11-003/index.html" }, { "title": "HPSBUX02685", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c02775276" }, { "title": "HPSBUX02642", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c02746026" }, { "title": "HPSBUX02633", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c02729756" }, { "title": "HPSBUX02641", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c02738573" }, { "title": "HPSBUX02645", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c02752210" }, { "title": "HPSBTU02684", "trust": 0.8, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en\u0026cc=us\u0026objectid=c02826781" }, { "title": "1469482", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21469482" }, { "title": "1468197", "trust": 0.8, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468197" }, { "title": "javacpufeb2011-304611", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html" }, { "title": "cpuapr2011-301950", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html" }, { "title": "alert-cve-2010-4476-305811", "trust": 0.8, "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html" }, { "title": "RHSA-2011:0336", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2011-0336.html" }, { "title": "RHSA-2011:0214", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2011-0214.html" }, { "title": "RHSA-2011:0282", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2011-0282.html" }, { "title": "RHSA-2011:0335", "trust": 0.8, "url": "https://rhn.redhat.com/errata/rhsa-2011-0335.html" }, { "title": "security_alert_for_cve-2010-44", "trust": 0.8, "url": "http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html" }, { "title": "april_2011_critical_patch_upda", "trust": 0.8, "url": "http://blogs.oracle.com/security/2011/04/april_2011_critical_patch_upda.html" }, { "title": "VMSA-2011-0013", "trust": 0.8, "url": "http://www.vmware.com/jp/support/support-resources/advisories/vmsa-2011-0013.html" }, { "title": "HS11-008", "trust": 0.8, "url": "http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs11-008/index.html" }, { "title": "HS11-009", "trust": 0.8, "url": "http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs11-009/index.html" }, { "title": "HS11-010", "trust": 0.8, "url": "http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs11-010/index.html" }, { "title": "HS11-003", "trust": 0.8, "url": "http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs11-003/index.html" }, { "title": "interstage_as_201101", "trust": 0.8, "url": "http://software.fujitsu.com/jp/security/products-fujitsu/solution/interstage_as_201101.html" }, { "title": "Debian Security Advisories: DSA-2161-1 openjdk-6 -- denial of service", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=8a0fbd8ef02c50b965cd7461fe7f588d" }, { "title": "Ubuntu Security Notice: openjdk-6b18 vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-1079-3" }, { "title": "Ubuntu Security Notice: openjdk-6 vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-1079-1" }, { "title": "Ubuntu Security Notice: openjdk-6b18 vulnerabilities", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=usn-1079-2" }, { "title": "VMware Security Advisories: VMware third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX", "trust": 0.1, "url": "https://vulmon.com/vendoradvisory?qidtp=vmware_security_advisories\u0026qid=31eb28d4d81f5dda33b13bdc58dfe8fb" } ], "sources": [ { "db": "VULMON", "id": "CVE-2010-4476" }, { "db": "JVNDB", "id": "JVNDB-2011-000018" }, { "db": "JVNDB", "id": "JVNDB-2011-000017" }, { "db": "JVNDB", "id": "JVNDB-2011-001185" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-189", "trust": 1.6 }, { "problemtype": "NVD-CWE-Other", "trust": 1.0 }, { "problemtype": "CWE-DesignError", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-000018" }, { "db": "JVNDB", "id": "JVNDB-2011-000017" }, { "db": "JVNDB", "id": "JVNDB-2011-001185" }, { "db": "NVD", "id": "CVE-2010-4476" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.7, "url": "http://secunia.com/advisories/43295" }, { "trust": 2.7, "url": "http://www.securitytracker.com/id?1025062" }, { "trust": 2.4, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4476" }, { "trust": 2.4, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-4476" }, { "trust": 1.9, "url": "http://secunia.com/advisories/43280" }, { "trust": 1.9, "url": "http://secunia.com/advisories/43304" }, { "trust": 1.5, "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html" }, { "trust": 1.4, "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html" }, { "trust": 1.4, "url": "http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/" }, { "trust": 1.4, "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html" }, { "trust": 1.4, "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs11-003/index.html" }, { "trust": 1.2, "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "trust": 1.1, "url": "http://www.redhat.com/support/errata/rhsa-2011-0214.html" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1pm31983" }, { "trust": 1.1, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-february/053926.html" }, { "trust": 1.1, "url": "http://www.debian.org/security/2011/dsa-2161" }, { "trust": 1.1, "url": "http://www.redhat.com/support/errata/rhsa-2011-0282.html" }, { "trust": 1.1, "url": "http://secunia.com/advisories/43400" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2011/0422" }, { "trust": 1.1, "url": "http://www.redhat.com/support/errata/rhsa-2011-0211.html" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1iz94423" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2011/0434" }, { "trust": 1.1, "url": "http://www.redhat.com/support/errata/rhsa-2011-0213.html" }, { "trust": 1.1, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468358" }, { "trust": 1.1, "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-february/053934.html" }, { "trust": 1.1, "url": "http://www13.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2011/0365" }, { "trust": 1.1, "url": "http://secunia.com/advisories/43378" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2011/0379" }, { "trust": 1.1, "url": "http://www.redhat.com/support/errata/rhsa-2011-0212.html" }, { "trust": 1.1, "url": "http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2011/0377" }, { "trust": 1.1, "url": "http://www.redhat.com/support/errata/rhsa-2011-0210.html" }, { "trust": 1.1, "url": "http://blog.fortify.com/blog/2011/02/08/double-trouble" }, { "trust": 1.1, "url": "http://secunia.com/advisories/43048" }, { "trust": 1.1, "url": "http://secunia.com/advisories/43333" }, { "trust": 1.1, "url": "http://www.redhat.com/support/errata/rhsa-2011-0334.html" }, { "trust": 1.1, "url": "http://www.redhat.com/support/errata/rhsa-2011-0333.html" }, { "trust": 1.1, "url": "http://secunia.com/advisories/45555" }, { "trust": 1.1, "url": "http://www.ibm.com/support/docview.wss?uid=swg24029498" }, { "trust": 1.1, "url": "http://www.ibm.com/support/docview.wss?uid=swg24029497" }, { "trust": 1.1, "url": "http://www.redhat.com/support/errata/rhsa-2011-0880.html" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "trust": 1.1, "url": "http://www.mandriva.com/security/advisories?name=mdvsa-2011:054" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2011/0605" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html" }, { "trust": 1.1, "url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html" }, { "trust": 1.1, "url": "http://secunia.com/advisories/43659" }, { "trust": 1.1, "url": "http://secunia.com/advisories/44954" }, { "trust": 1.1, "url": "http://secunia.com/advisories/45022" }, { "trust": 1.1, "url": "http://support.novell.com/docs/readmes/infodocument/patchbuilder/readme_5098550.html" }, { "trust": 1.1, "url": "http://secunia.com/advisories/49198" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=130270785502599\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=130497185606818\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=130497132406206\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=130168502603566\u0026w=2" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a19493" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a14589" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a14328" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a12745" }, { "trust": 1.1, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a12662" }, { "trust": 1.1, "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "trust": 0.9, "url": "http://www.securityfocus.com/bid/46091" }, { "trust": 0.8, "url": "http://jvn.jp/en/jp/jvn97334690/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/en/jp/jvn26301278/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/jp/jvn97334690/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu584356/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/jp/jvn16308183/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/jp/jvn26301278/index.html" }, { "trust": 0.8, "url": "http://jvn.jp/tr/jvntr-2011-02" }, { "trust": 0.8, "url": "http://secunia.com/advisories/43198" }, { "trust": 0.8, "url": "http://secunia.com/advisories/43262" }, { "trust": 0.8, "url": "http://secunia.com/advisories/44303" }, { "trust": 0.8, "url": "http://secunia.com/advisories/43194" }, { "trust": 0.8, "url": "http://www.vupen.com/english/advisories/2011/0294" }, { "trust": 0.8, "url": "http://www.vupen.com/english/advisories/2011/0339" }, { "trust": 0.8, "url": "http://www.vupen.com/english/advisories/2011/1051" }, { "trust": 0.8, "url": "http://www.vupen.com/english/advisories/2011/0405" }, { "trust": 0.6, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468884" }, { "trust": 0.6, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21469222" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4476" }, { "trust": 0.5, "url": "https://www.hp.com/go/swa" }, { "trust": 0.4, "url": "http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs11-008/index.html" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4448" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg24030795" }, { "trust": 0.3, "url": "http://www.novell.com/support/viewcontent.do?externalid=7008129" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21509635" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21468287" }, { "trust": 0.3, "url": "https://h20392.www2.hp.com/portal/swdepot/displayproductinfo.do?productnumber=hpuxfpupdater" }, { "trust": 0.3, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c02752210" }, { "trust": 0.3, "url": "http://h20565.www2.hp.com/portal/site/hpsc/public/kb/docdisplay/?docid=emr_na-c03090723\u0026ac.admitted=1321942068127.876444892.492883150" }, { "trust": 0.3, "url": "http://www.novell.com/support/viewcontent.do?externalid=7009249" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21469285" }, { "trust": 0.3, "url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-201101e.html" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=ssg1s1003877" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg1oa35932" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24029090" }, { "trust": 0.3, "url": "http://support.attachmate.com/techdocs/1704.html" }, { "trust": 0.3, "url": "http://java.sun.com" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468728" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24032592" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21474615" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg24029498" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg24029497" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg24029827" }, { "trust": 0.3, "url": "/archive/1/516213" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21469074" }, { "trust": 0.3, "url": "http://support.avaya.com/css/p8/documents/100127618" }, { "trust": 0.3, "url": "http://support.avaya.com/css/p8/documents/100128342" }, { "trust": 0.3, "url": "http://support.avaya.com/css/p8/documents/100131812" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21469482" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21469001" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21469261" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468267" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21508061" }, { "trust": 0.3, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c02906075" }, { "trust": 0.3, "url": "http://www11.itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02720715" }, { "trust": 0.3, "url": "http://itrc.hp.com/service/cki/docdisplay.do?docid=emr_na-c02738573" }, { "trust": 0.3, "url": "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?objectid=c03358587" }, { "trust": 0.3, "url": "http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs11-009/index.html" }, { "trust": 0.3, "url": "http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs11-010/index.html" }, { "trust": 0.3, "url": "http://www.ibm.com/developerworks/java/jdk/alerts/cve-2010-4476.html" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas2a5e8722f285b693586257837004234f7" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas239097234bdef0f0086257837004234ff" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas2e3651fd2836659b88625783700423505" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas2bbd9eef75e33a6ec862578370042350b" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas24394745ae41518b88625783700423513" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas274b0e6114eba807a8625783700423519" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=nas22c04013ef2a6aba98625783700423520" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21468291" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1iz94331" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21469266" }, { "trust": 0.3, "url": "http://www.ibm.com/support/docview.wss?uid=swg21469046" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21469229" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468927" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg24029823" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468987" }, { "trust": 0.3, "url": "https://rhn.redhat.com/errata/rhsa-2011-0334.html" }, { "trust": 0.3, "url": "https://rhn.redhat.com/errata/rhsa-2011-0333.html" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468915" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468912" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21469042" }, { "trust": 0.3, "url": "http://support.attachmate.com/techdocs/2566.html" }, { "trust": 0.3, "url": "http://support.attachmate.com/techdocs/2564.html" }, { "trust": 0.3, "url": "http://support.attachmate.com/techdocs/2560.html" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468521" }, { "trust": 0.3, "url": "http://www.novell.com/support/viewcontent.do?externalid=7008485" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468705" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=isg400000547" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24033364" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24032885" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg24029766" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg24029768" }, { "trust": 0.3, "url": "http://www-01.ibm.com/support/docview.wss?uid=swg24029502" }, { "trust": 0.3, "url": "http://h20566.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/" }, { "trust": 0.3, "url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins" }, { "trust": 0.3, "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3562" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3568" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3541" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3566" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3569" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3573" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3548" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3549" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3565" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3574" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4422" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3553" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3551" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3557" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4465" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4469" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4454" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4447" }, { "trust": 0.3, "url": "https://www.hp.com/go/java" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3574" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3548" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3565" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3563" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0864" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3553" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3560" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3557" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4450" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0865" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4471" }, { "trust": 0.2, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3557" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3567" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3556" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3550" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4476" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3554" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0862" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3561" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4467" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3567" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4465" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4472" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3556" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3568" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3548" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3558" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3549" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3562" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3573" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3552" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4469" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3572" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4448" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3521" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3569" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0871" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0815" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3571" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3554" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3541" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0872" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3554" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4470" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3551" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3544" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3547" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3560" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0869" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3555" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3566" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3551" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3553" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3558" }, { "trust": 0.2, "url": "http://security.gentoo.org/" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3561" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0868" }, { "trust": 0.2, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3389" }, { "trust": 0.2, "url": "https://bugs.gentoo.org." }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4470" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3555" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4450" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4467" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4452" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0815" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0814" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4462" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0862" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4475" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4473" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0802" }, { "trust": 0.2, "url": "http://secunia.com/products/corporate/evm/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.2, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.2, "url": "http://www.itrc.hp.com/service/cki/secbullarchive.do" }, { "trust": 0.2, "url": "http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na\u0026langcode=useng\u0026jumpid=in_sc-gen__driveritrc\u0026topiccode=itrc" }, { "trust": 0.2, "url": "http://h30046.www3.hp.com/subsignin.php" }, { "trust": 0.1, "url": "https://cwe.mitre.org/data/definitions/.html" }, { "trust": 0.1, "url": "https://www.debian.org/security/./dsa-2161" }, { "trust": 0.1, "url": "https://nvd.nist.gov" }, { "trust": 0.1, "url": "https://www.exploit-db.com/exploits/35304/" }, { "trust": 0.1, "url": "https://usn.ubuntu.com/1079-3/" }, { "trust": 0.1, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=22468" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2204" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0033" }, { "trust": 0.1, "url": "https://h20392.www2.hp.com/portal" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3548" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2526" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2902" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3718" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4858" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3190" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0580" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-2693" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0781" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2227" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0022" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2008-5515" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1184" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-0783" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-5885" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0013" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1157" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2729" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4474" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0814" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3570" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3555" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4451" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3516" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3550" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3550" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4447" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3549" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3563" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4466" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0863" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3555" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3556" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4462" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3571" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3546" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3559" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3561" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3558" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4475" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3559" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3552" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3552" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0867" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4468" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4463" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3560" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3570" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3545" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4452" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0802" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4422" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4473" }, { "trust": 0.1, "url": "http://security.gentoo.org/glsa/glsa-201111-02.xml" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3572" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0873" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4454" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3423" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2469" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2443" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1717" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2412" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1716" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0505" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1518" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2419" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2414" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-3829" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5829" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5804" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1485" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5806" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5087" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2422" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5075" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2426" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-4002" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5084" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1711" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1478" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2461" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5820" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5979" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6954" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2470" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0547" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4540" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0429" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0441" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2451" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2459" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5823" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2421" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0870" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2460" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1713" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0706" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0434" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5784" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5830" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5800" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2456" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5803" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5086" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0425" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2383" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2423" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2447" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2452" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2445" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2450" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5778" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5780" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5073" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1493" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2446" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5069" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-5035" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1500" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3571" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2009-3555" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0426" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0457" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5850" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2783" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0451" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0459" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2423" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-1876" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2384" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0431" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1557" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0458" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2548" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2453" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0401" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5085" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2407" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2421" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3564" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2429" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2403" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5068" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2548" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5071" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2398" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0432" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0444" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1475" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0497" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5774" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5782" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1725" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5790" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5805" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3564" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5802" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5849" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1719" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0461" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0442" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2448" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2458" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0427" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2427" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5825" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0506" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1484" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2430" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2415" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3216" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0429" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1718" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5772" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3860" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3422" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0433" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5074" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2454" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2444" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5072" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2436" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4416" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0822" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1537" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2449" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0503" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-0025" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2457" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1476" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0169" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0424" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3563" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0809" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5077" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0435" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0456" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1723" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1726" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0450" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1571" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0460" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5081" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5840" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5851" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2465" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2431" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2473" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-6629" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5783" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-2783" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2463" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2412" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5809" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1480" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-4351" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2420" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0501" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0428" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2417" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2471" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2424" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5076" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5842" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-2397" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0452" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1569" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-1724" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5797" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5070" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1486" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2472" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0446" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2014-0453" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-3860" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1488" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0502" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0440" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0443" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5814" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5817" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4351" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2455" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5089" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4474" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0817" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4468" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4471" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4466" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0786" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4463" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0788" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4451" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4472" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-3550.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-3568.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-3574.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-3556.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-4468.html" }, { "trust": 0.1, "url": "https://access.redhat.com/kb/docs/doc-11259" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-3548.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-3563.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-4476.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-3551.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-3560.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-1321.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-3569.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-4447.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-3558.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/updates/classification/#low" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-4452.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-3549.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-4462.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-3566.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-4422.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-3571.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-4475.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-4473.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.1, "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "trust": 0.1, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-3572.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2009-3555.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-3573.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-3541.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-4463.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-4454.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1321" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-3562.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-4448.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-4467.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-4471.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-4465.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-4466.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-3557.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-3565.html" }, { "trust": 0.1, "url": "http://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-3555.html" }, { "trust": 0.1, "url": "https://www.redhat.com/security/data/cve/cve-2010-3553.html" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2011-0880.html" }, { "trust": 0.1, "url": "http://twitter.com/secunia" }, { "trust": 0.1, "url": "http://www.facebook.com/secunia" }, { "trust": 0.1, "url": "http://secunia.com/advisories/44576/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/44576/#comments" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44576" }, { "trust": 0.1, "url": "http://secunia.com/products/corporate/vim/section_179/" }, { "trust": 0.1, "url": "http://www.exploringbinary.com/why-volatile-fixes-the-2-2250738585072011e-308-bug/comment-page-1/#comment-4645" }, { "trust": 0.1, "url": "http://secunia.com/advisories/43262/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/43262/#comments" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=43262" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3549" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0865" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3563" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0864" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3545" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3560" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3552" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0499" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3389" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3556" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3557" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3548" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0867" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0871" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3547" } ], "sources": [ { "db": "VULMON", "id": "CVE-2010-4476" }, { "db": "BID", "id": "46091" }, { "db": "JVNDB", "id": "JVNDB-2011-000018" }, { "db": "JVNDB", "id": "JVNDB-2011-000017" }, { "db": "JVNDB", "id": "JVNDB-2011-001185" }, { "db": "PACKETSTORM", "id": "121037" }, { "db": "PACKETSTORM", "id": "106640" }, { "db": "PACKETSTORM", "id": "127267" }, { "db": "PACKETSTORM", "id": "114812" }, { "db": "PACKETSTORM", "id": "102374" }, { "db": "PACKETSTORM", "id": "101468" }, { "db": "PACKETSTORM", "id": "101334" }, { "db": "PACKETSTORM", "id": "98322" }, { "db": "PACKETSTORM", "id": "100414" }, { "db": "PACKETSTORM", "id": "112826" }, { "db": "NVD", "id": "CVE-2010-4476" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULMON", "id": "CVE-2010-4476" }, { "db": "BID", "id": "46091" }, { "db": "JVNDB", "id": "JVNDB-2011-000018" }, { "db": "JVNDB", "id": "JVNDB-2011-000017" }, { "db": "JVNDB", "id": "JVNDB-2011-001185" }, { "db": "PACKETSTORM", "id": "121037" }, { "db": "PACKETSTORM", "id": "106640" }, { "db": "PACKETSTORM", "id": "127267" }, { "db": "PACKETSTORM", "id": "114812" }, { "db": "PACKETSTORM", "id": "102374" }, { "db": "PACKETSTORM", "id": "101468" }, { "db": "PACKETSTORM", "id": "101334" }, { "db": "PACKETSTORM", "id": "98322" }, { "db": "PACKETSTORM", "id": "100414" }, { "db": "PACKETSTORM", "id": "112826" }, { "db": "NVD", "id": "CVE-2010-4476" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-02-17T00:00:00", "db": "VULMON", "id": "CVE-2010-4476" }, { "date": "2011-02-01T00:00:00", "db": "BID", "id": "46091" }, { "date": "2011-03-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-000018" }, { "date": "2011-03-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-000017" }, { "date": "2011-03-08T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001185" }, { "date": "2013-04-01T15:55:00", "db": "PACKETSTORM", "id": "121037" }, { "date": "2011-11-06T01:01:42", "db": "PACKETSTORM", "id": "106640" }, { "date": "2014-06-30T23:39:28", "db": "PACKETSTORM", "id": "127267" }, { "date": "2012-07-17T21:49:22", "db": "PACKETSTORM", "id": "114812" }, { "date": "2011-06-17T12:57:44", "db": "PACKETSTORM", "id": "102374" }, { "date": "2011-05-16T06:02:35", "db": "PACKETSTORM", "id": "101468" }, { "date": "2011-05-12T01:01:50", "db": "PACKETSTORM", "id": "101334" }, { "date": "2011-02-09T03:30:06", "db": "PACKETSTORM", "id": "98322" }, { "date": "2011-04-14T16:30:05", "db": "PACKETSTORM", "id": "100414" }, { "date": "2012-05-17T21:16:37", "db": "PACKETSTORM", "id": "112826" }, { "date": "2011-02-17T19:00:01.900000", "db": "NVD", "id": "CVE-2010-4476" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-30T00:00:00", "db": "VULMON", "id": "CVE-2010-4476" }, { "date": "2015-04-13T21:31:00", "db": "BID", "id": "46091" }, { "date": "2018-02-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-000018" }, { "date": "2018-02-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-000017" }, { "date": "2018-02-07T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001185" }, { "date": "2018-10-30T16:26:21.390000", "db": "NVD", "id": "CVE-2010-4476" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "network", "sources": [ { "db": "BID", "id": "46091" } ], "trust": 0.3 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "IBM Lotus vulnerable to denial-of-service (DoS)", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-000018" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Boundary Condition Error", "sources": [ { "db": "BID", "id": "46091" } ], "trust": 0.3 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.