Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2010-4476 (GCVE-0-2010-4476)
Vulnerability from cvelistv5
Published
2011-02-17 18:31
Modified
2024-08-07 03:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:43:14.943Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "43295", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43295" }, { "name": "1025062", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1025062" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html" }, { "name": "43280", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43280" }, { "name": "RHSA-2011:0210", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0210.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html" }, { "name": "GLSA-201406-32", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "oval:org.mitre.oval:def:14328", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14328" }, { "name": "HPSBMU02799", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "name": "FEDORA-2011-1231", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053926.html" }, { "name": "FEDORA-2011-1263", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053934.html" }, { "name": "SUSE-SU-2011:0823", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html" }, { "name": "HPSBNS02633", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" }, { "name": "SSRT100387", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "name": "HPSBUX02860", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "name": "RHSA-2011:0214", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0214.html" }, { "name": "PM31983", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM31983" }, { "name": "45555", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45555" }, { "name": "IZ94423", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ94423" }, { "name": "43400", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43400" }, { "name": "SSRT100412", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "name": "HPSBMA02642", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "name": "43378", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43378" }, { "name": "45022", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/45022" }, { "name": "RHSA-2011:0333", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0333.html" }, { "name": "ADV-2011-0422", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0422" }, { "name": "oval:org.mitre.oval:def:12662", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12662" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html" }, { "name": "HPSBMU02690", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "name": "ADV-2011-0434", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0434" }, { "name": "HPSBUX02633", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "name": "HPSBOV02762", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "name": "oval:org.mitre.oval:def:14589", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14589" }, { "name": "HPSBUX02641", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "name": "RHSA-2011:0213", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0213.html" }, { "name": "SSRT100627", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/" }, { "name": "ADV-2011-0377", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0377" }, { "name": "44954", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44954" }, { "name": "HPSBOV02634", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=130497132406206\u0026w=2" }, { "name": "ADV-2011-0365", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0365" }, { "name": "SSRT100415", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html" }, { "name": "RHSA-2011:0880", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html" }, { "name": "oval:org.mitre.oval:def:12745", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12745" }, { "name": "RHSA-2011:0334", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0334.html" }, { "name": "RHSA-2011:0282", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0282.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468358" }, { "name": "43048", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43048" }, { "name": "DSA-2161", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2011/dsa-2161" }, { "name": "SSRT100825", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "name": "ADV-2011-0379", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0379" }, { "name": "43304", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43304" }, { "name": "RHSA-2011:0211", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0211.html" }, { "name": "SSRT100390", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" }, { "name": "SSRT100867", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "name": "49198", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/49198" }, { "name": "43659", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43659" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg24029498" }, { "name": "HPSBUX02725", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "name": "SUSE-SA:2011:024", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html" }, { "name": "HPSBUX02777", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "oval:org.mitre.oval:def:19493", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19493" }, { "name": "43333", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43333" }, { "name": "SSRT101146", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "name": "SSRT100569", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "name": "HPSBUX02645", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=130168502603566\u0026w=2" }, { "name": "RHSA-2011:0212", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0212.html" }, { "name": "HPSBUX02642", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=130270785502599\u0026w=2" }, { "name": "SSRT100854", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html" }, { "name": "ADV-2011-0605", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0605" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blog.fortify.com/blog/2011/02/08/Double-Trouble" }, { "name": "HPSBTU02684", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=130497185606818\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg24029497" }, { "name": "MDVSA-2011:054", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:054" }, { "name": "HPSBMU02797", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-02-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-21T18:57:01", "orgId": "43595867-4340-4103-b7a2-9a5208d29a85", "shortName": "oracle" }, "references": [ { "name": "43295", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43295" }, { "name": "1025062", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1025062" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html" }, { "name": "43280", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43280" }, { "name": "RHSA-2011:0210", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0210.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html" }, { "name": "GLSA-201406-32", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "oval:org.mitre.oval:def:14328", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14328" }, { "name": "HPSBMU02799", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "name": "FEDORA-2011-1231", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053926.html" }, { "name": "FEDORA-2011-1263", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053934.html" }, { "name": "SUSE-SU-2011:0823", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html" }, { "name": "HPSBNS02633", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" }, { "name": "SSRT100387", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "name": "HPSBUX02860", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "name": "RHSA-2011:0214", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0214.html" }, { "name": "PM31983", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM31983" }, { "name": "45555", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45555" }, { "name": "IZ94423", "tags": [ "vendor-advisory", "x_refsource_AIXAPAR" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ94423" }, { "name": "43400", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43400" }, { "name": "SSRT100412", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "name": "HPSBMA02642", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "name": "43378", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43378" }, { "name": "45022", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/45022" }, { "name": "RHSA-2011:0333", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0333.html" }, { "name": "ADV-2011-0422", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0422" }, { "name": "oval:org.mitre.oval:def:12662", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12662" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html" }, { "name": "HPSBMU02690", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "name": "ADV-2011-0434", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0434" }, { "name": "HPSBUX02633", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "name": "HPSBOV02762", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "name": "oval:org.mitre.oval:def:14589", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14589" }, { "name": "HPSBUX02641", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "name": "RHSA-2011:0213", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0213.html" }, { "name": "SSRT100627", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/" }, { "name": "ADV-2011-0377", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0377" }, { "name": "44954", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44954" }, { "name": "HPSBOV02634", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=130497132406206\u0026w=2" }, { "name": "ADV-2011-0365", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0365" }, { "name": "SSRT100415", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html" }, { "name": "RHSA-2011:0880", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html" }, { "name": "oval:org.mitre.oval:def:12745", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12745" }, { "name": "RHSA-2011:0334", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0334.html" }, { "name": "RHSA-2011:0282", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0282.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468358" }, { "name": "43048", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43048" }, { "name": "DSA-2161", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2011/dsa-2161" }, { "name": "SSRT100825", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "name": "ADV-2011-0379", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0379" }, { "name": "43304", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43304" }, { "name": "RHSA-2011:0211", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0211.html" }, { "name": "SSRT100390", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" }, { "name": "SSRT100867", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "name": "49198", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/49198" }, { "name": "43659", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43659" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg24029498" }, { "name": "HPSBUX02725", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "name": "SUSE-SA:2011:024", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html" }, { "name": "HPSBUX02777", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "oval:org.mitre.oval:def:19493", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19493" }, { "name": "43333", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43333" }, { "name": "SSRT101146", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "name": "SSRT100569", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "name": "HPSBUX02645", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=130168502603566\u0026w=2" }, { "name": "RHSA-2011:0212", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0212.html" }, { "name": "HPSBUX02642", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=130270785502599\u0026w=2" }, { "name": "SSRT100854", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html" }, { "name": "ADV-2011-0605", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0605" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blog.fortify.com/blog/2011/02/08/Double-Trouble" }, { "name": "HPSBTU02684", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=130497185606818\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg24029497" }, { "name": "MDVSA-2011:054", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:054" }, { "name": "HPSBMU02797", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2010-4476", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "43295", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43295" }, { "name": "1025062", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025062" }, { "name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html", "refsource": "CONFIRM", "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html" }, { "name": "43280", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43280" }, { "name": "RHSA-2011:0210", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0210.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html" }, { "name": "GLSA-201406-32", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "oval:org.mitre.oval:def:14328", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14328" }, { "name": "HPSBMU02799", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "name": "FEDORA-2011-1231", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053926.html" }, { "name": "FEDORA-2011-1263", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053934.html" }, { "name": "SUSE-SU-2011:0823", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html" }, { "name": "HPSBNS02633", "refsource": "HP", "url": "http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" }, { "name": "SSRT100387", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "name": "HPSBUX02860", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "name": "RHSA-2011:0214", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0214.html" }, { "name": "PM31983", "refsource": "AIXAPAR", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM31983" }, { "name": "45555", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/45555" }, { "name": "IZ94423", "refsource": "AIXAPAR", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ94423" }, { "name": "43400", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43400" }, { "name": "SSRT100412", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "name": "HPSBMA02642", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "name": "43378", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43378" }, { "name": "45022", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/45022" }, { "name": "RHSA-2011:0333", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0333.html" }, { "name": "ADV-2011-0422", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0422" }, { "name": "oval:org.mitre.oval:def:12662", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12662" }, { "name": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html" }, { "name": "HPSBMU02690", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "name": "ADV-2011-0434", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0434" }, { "name": "HPSBUX02633", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "name": "HPSBOV02762", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "name": "oval:org.mitre.oval:def:14589", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14589" }, { "name": "HPSBUX02641", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "name": "RHSA-2011:0213", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0213.html" }, { "name": "SSRT100627", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "name": "http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/", "refsource": "MISC", "url": "http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/" }, { "name": "ADV-2011-0377", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0377" }, { "name": "44954", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44954" }, { "name": "HPSBOV02634", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130497132406206\u0026w=2" }, { "name": "ADV-2011-0365", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0365" }, { "name": "SSRT100415", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "name": "http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html", "refsource": "CONFIRM", "url": "http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html" }, { "name": "RHSA-2011:0880", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html" }, { "name": "oval:org.mitre.oval:def:12745", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12745" }, { "name": "RHSA-2011:0334", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0334.html" }, { "name": "RHSA-2011:0282", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0282.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21468358", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468358" }, { "name": "43048", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43048" }, { "name": "DSA-2161", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2161" }, { "name": "SSRT100825", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "name": "ADV-2011-0379", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0379" }, { "name": "43304", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43304" }, { "name": "RHSA-2011:0211", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0211.html" }, { "name": "SSRT100390", "refsource": "HP", "url": "http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" }, { "name": "SSRT100867", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "name": "49198", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49198" }, { "name": "43659", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43659" }, { "name": "http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg24029498", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg24029498" }, { "name": "HPSBUX02725", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "name": "SUSE-SA:2011:024", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html" }, { "name": "HPSBUX02777", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "oval:org.mitre.oval:def:19493", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19493" }, { "name": "43333", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43333" }, { "name": "SSRT101146", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "name": "SSRT100569", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "name": "HPSBUX02645", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130168502603566\u0026w=2" }, { "name": "RHSA-2011:0212", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0212.html" }, { "name": "HPSBUX02642", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130270785502599\u0026w=2" }, { "name": "SSRT100854", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html", "refsource": "CONFIRM", "url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html" }, { "name": "ADV-2011-0605", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0605" }, { "name": "http://blog.fortify.com/blog/2011/02/08/Double-Trouble", "refsource": "MISC", "url": "http://blog.fortify.com/blog/2011/02/08/Double-Trouble" }, { "name": "HPSBTU02684", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130497185606818\u0026w=2" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg24029497", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg24029497" }, { "name": "MDVSA-2011:054", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:054" }, { "name": "HPSBMU02797", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "43595867-4340-4103-b7a2-9a5208d29a85", "assignerShortName": "oracle", "cveId": "CVE-2010-4476", "datePublished": "2011-02-17T18:31:00", "dateReserved": "2010-12-06T00:00:00", "dateUpdated": "2024-08-07T03:43:14.943Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2010-4476\",\"sourceIdentifier\":\"secalert_us@oracle.com\",\"published\":\"2011-02-17T19:00:01.900\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.\"},{\"lang\":\"es\",\"value\":\"El m\u00e9todo Double.parseDouble en Java Runtime Environment (JRE) en Oracle Java SE y Java para Business 6 Update 23 y versiones anteriores, 5.0 Update 27 y versiones anteriores y 1.4.2_29 y versiones anteriores, tal como se utiliza en OpenJDK, Apache, JBossweb y otros productos , permite a atacantes remotos provocar una denegaci\u00f3n de servicio a trav\u00e9s de una cadena manipulada que desencadena un bucle infinito de estimaciones durante la conversi\u00f3n a un n\u00famero de coma flotante binario de doble precisi\u00f3n, como se demuestra usando 2.2250738585072012e-308.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:*:update_23:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.6.0\",\"matchCriteriaId\":\"0863352B-4389-466F-9240-90944DB1B932\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBCD143C-057D-4F42-B487-46801E14ACF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"09027C19-D442-446F-B7A8-21DB6787CF43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A0FEC28-0707-4F42-9740-78F3D2D551EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3C5879A-A608-4230-9DC1-C27F0F48A13B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A3B254-8580-45DB-BDE4-5B5A29CBFFB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*\",\"matchCriteriaId\":\"1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*\",\"matchCriteriaId\":\"AADBB4F9-E43E-428B-9979-F47A15696C85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*\",\"matchCriteriaId\":\"49260B94-05DE-4B78-9068-6F5F6BFDD19E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4FDE9EB-08FE-436E-A265-30E83B15DB23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE409D5C-8F9F-4DE9-ACB7-0E0B813F6399\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7158D2C0-E9AC-4CD6-B777-EA7B7A181997\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*\",\"matchCriteriaId\":\"B08C075B-9FC0-4381-A9E4-FFF0362BD308\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*\",\"matchCriteriaId\":\"F587E635-3A15-4186-B6A1-F99BE0A56820\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_22:*:*:*:*:*:*\",\"matchCriteriaId\":\"188D2242-7D16-4F8E-AB61-4663804AAC17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"90EC6C13-4B37-48E5-8199-A702A944D5A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"2528152C-E20A-4D97-931C-A5EC3CEAA06D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"A99DAB4C-272B-4C91-BC70-7729E1152590\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"30DFC10A-A4D9-4F89-B17C-AB9260087D29\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"272A5C44-18EC-41A9-8233-E9D4D0734EA6\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:*:update_23:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.6.0\",\"matchCriteriaId\":\"F647BC01-31B7-4FF9-B77B-FD4F5B3E708D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3A4FEC7-A4A0-4B5C-A56C-8F80AE19865E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*\",\"matchCriteriaId\":\"722A93D8-B5BC-42F3-92A2-E424F61269A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*\",\"matchCriteriaId\":\"775F2611-F11C-4B84-8F40-0D034B81BF18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*\",\"matchCriteriaId\":\"F20FDD9F-FF45-48BC-9207-54FB02E76071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FA326F5-894A-4B01-BCA3-B126DA81CA59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*\",\"matchCriteriaId\":\"228AB7B4-4BA4-43D4-B562-D438884DB152\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFD5C688-2103-4D60-979E-D9BE69A989C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*\",\"matchCriteriaId\":\"21421215-F722-4207-A2E5-E2DF4B29859B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFB9EA23-0EF7-4582-A265-3F5AA9EC81B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*\",\"matchCriteriaId\":\"C367B418-659E-4627-B1F1-1B1216C99055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD5E6D4E-DDDD-4B45-B5E9-F8A916287AF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*\",\"matchCriteriaId\":\"7358492A-491C-491E-AEDF-63CB82619BAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3DACAAF-AFDC-4391-9E85-344F30937F76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_22:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECEDE405-CEF6-4E52-A8AE-28B9274B2289\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D98175BF-B084-4FA5-899D-9E80DC3923EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*\",\"matchCriteriaId\":\"820632CE-F8DF-47EE-B716-7530E60008B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA2BD0A3-7B2D-447B-ABAC-7B867B03B632\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*\",\"matchCriteriaId\":\"D54AB785-E9B7-47BD-B756-0C3A629D67DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*\",\"matchCriteriaId\":\"E9412098-0353-4F7B-9245-010557E6C651\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD30DAEB-4893-41CF-A455-B69C463B9337\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*\",\"matchCriteriaId\":\"21D6CE7E-A036-496C-8E08-A87F62B5290A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8F93BBE-1E8C-4EB3-BCC7-20AB2D813F98\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:*:update27:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.5.0\",\"matchCriteriaId\":\"B32A75D7-8038-413A-BDB8-43C9A6DE33F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A02CF738-1B4F-44D0-A618-3D3E4EF1C9B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE8E883F-E13D-4FB0-8C6F-B7628600E8D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*\",\"matchCriteriaId\":\"2AADA633-EB11-49A0-8E40-66589034F03E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*\",\"matchCriteriaId\":\"19DC29C5-1B9F-46DF-ACF6-3FF93E45777D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*\",\"matchCriteriaId\":\"B120F7D9-7C1E-4716-B2FA-2990D449F754\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD61E49F-2A46-4107-BB3F-527079983306\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*\",\"matchCriteriaId\":\"D900AAE0-6032-4096-AFC2-3D43C55C6C83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*\",\"matchCriteriaId\":\"88B0958C-744C-4946-908C-09D2A5FAB120\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3E7F3CA-FFB3-42B3-A64F-0E38FAF252FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A2D8D09-3F18-4E73-81CF-BB589BB8AEC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*\",\"matchCriteriaId\":\"3FD24779-988F-4EC1-AC19-77186B68229E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F1E860E-98F2-48FF-B8B3-54D4B58BF81F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"28BE548B-DD0C-4C58-98CA-5B803F04F9EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*\",\"matchCriteriaId\":\"505A8F40-7758-412F-8895-FA1B00BE6B7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*\",\"matchCriteriaId\":\"212F4A5F-87E3-4C62-BA21-46CBBCD8D26A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C4DFCD2-00A3-4BC7-8842-836CE22C7B39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB3A0C49-3FF9-4CB7-9E01-F771D4925103\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7D1BBD4-2F88-4372-B863-BB70753D841B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update25:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A75A4C0-6B49-424B-BEC0-0E0AAEF877B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update26:*:*:*:*:*:*\",\"matchCriteriaId\":\"03555D1A-9470-4227-B843-E6EF91A6BC55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F8E9AA0-8907-4B1A-86A1-08568195217D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A337AD31-4566-4A4E-AFF3-7EAECD5C90F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*\",\"matchCriteriaId\":\"0754AFDC-2F1C-4C06-AB46-457B5E610029\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*\",\"matchCriteriaId\":\"532CF9DD-0EBB-4B3B-BB9C-A8D78947A790\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC0ABF7A-107B-4B97-9BD7-7B0CEDAAF359\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5DA4242-30D9-44C8-9D0D-877348FFA22B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*\",\"matchCriteriaId\":\"C61C6043-99D0-4F36-AF84-1A5F90B895EE\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.4.2_29\",\"matchCriteriaId\":\"6186321E-5B05-49B5-9200-EA6B5CC3653B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"002CA86D-3090-4C7A-947A-21CB5D1ADD98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F6453C9-7EE0-4FFB-861D-C2D9416DCABA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF4E34FD-D927-42BB-8A16-031D77CB4B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DDE253E-C8B6-4C1D-AECE-ABEA1A67306B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A56D9A60-F272-4D4C-A9DD-C93DAF783585\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF109CAA-E8D2-4BD7-BE7C-AF8B2A78672E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"976F4ACB-3725-45B7-B2EF-DEE4B88254E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52BDD6A8-1611-4C3C-865D-6EDB5B9F8D88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A1F28FF-652A-4C89-9AC6-5E212F890811\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"96A8C351-E9CD-431B-8B9D-712CA54C7213\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36888382-79C8-4C97-A654-C668CD68556F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F34C99E6-F9F0-4EF3-8601-B47EAE3D7273\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A74DD08D-CEDB-460E-BED5-78F6CAF18BF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E60560EC-6DBD-4A17-BFFA-FAD9193A0BC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4F64FBC-DC97-4FE3-A235-18B87945AF7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85048406-9051-4E69-94A8-5C449F3B89E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1C88DD7-0B46-4405-BD35-60D27E2DBA14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08D23B7C-7B8C-41B8-8D94-BB0F27C7F0A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C49B997-95D3-4DA4-A353-DB41AD461C5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F70EF76-ED5F-4835-8252-FE613604FA3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BDBCAD8-CDF7-4550-8EA2-1409B02FFAD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E691333-0434-4808-9ED4-E82C6EC2FD37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBE7A538-FF2E-4622-8479-781AB73CBA45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CD491CD3-5763-4698-8893-2D5F5609BD89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADF4E465-6B0B-4295-81F7-D09ADB81394C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E79C04F7-E3A1-4DF5-94E9-E96A6FC61FC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5743F0FD-486D-4787-B53E-CCD220BBCDF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39847B3A-6DF5-4CED-B89C-18513395B540\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:sdk:1.4.2_28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"649AD6BA-D8CF-4C19-A540-E2266945015F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:*:update27:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.5.0\",\"matchCriteriaId\":\"4A7E109E-D17D-4396-B1F3-8D9E059BCFFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"133A7B66-E0B3-4867-A5A4-3C54D6C0C8ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7FC09E8-7F30-4FE4-912E-588AA250E2A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*\",\"matchCriteriaId\":\"A586DE4E-8A46-41DE-9FDB-5FDB81DCC87B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*\",\"matchCriteriaId\":\"9919D091-73D7-465A-80FF-F37D6CAF9F46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*\",\"matchCriteriaId\":\"02565D6F-4CB2-4671-A4EF-3169BCFA6154\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*\",\"matchCriteriaId\":\"452A3E51-9EAC-451D-BA04-A1E7B7D917EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E8C6AAC-C90B-4220-A69B-2A886A35CF5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*\",\"matchCriteriaId\":\"55231B6B-9298-4363-9B5A-14C2DA7B1F50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*\",\"matchCriteriaId\":\"E42CF0F7-418C-4BB6-9B73-FA3B9171D092\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5467E9D-07D8-4BEB-84D5-A3136C133519\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*\",\"matchCriteriaId\":\"B83B2CE1-45D7-47AD-BC0A-6EC74D5F8F5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A32F326-EA92-43CD-930E-E527B60CDD3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EA5B9E9-654D-44F7-AE98-3D8B382804AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*\",\"matchCriteriaId\":\"04344167-530E-4A4D-90EF-74C684943DF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0E0373B-201D-408F-9234-A7EFE8B4970D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*\",\"matchCriteriaId\":\"15EAD76D-D5D0-4984-9D07-C1451D791083\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE949EBF-2BC0-4355-8B28-B494023D45FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E0A0A2D-62B9-4A00-84EF-90C15E47A632\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*\",\"matchCriteriaId\":\"A070A282-CBD6-4041-B149-5E310BD12E7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ECAE71B-C549-4EFB-A509-BFD599F5917A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*\",\"matchCriteriaId\":\"44051CFE-D15D-4416-A123-F3E49C67A9E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*\",\"matchCriteriaId\":\"F296ACF3-1373-429D-B991-8B5BA704A7EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B863420B-DE16-416A-9640-1A1340A9B855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*\",\"matchCriteriaId\":\"724C972F-74FE-4044-BBC4-7E0E61FC9002\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*\",\"matchCriteriaId\":\"46F41C15-0EF4-4115-BFAA-EEAD56FAEEDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBE909DE-E55A-4BD3-A5BF-ADE407432193\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DAC04D2-68FD-4793-A8E7-4690A543D7D4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.4.2_29\",\"matchCriteriaId\":\"E1107386-7777-40DF-96FF-11A9A30CABBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63978872-E797-4F13-B0F9-98CB67D0962A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EEAB662-644A-4D7B-8237-64142CF48724\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9598A49-95F2-42DB-B92C-CD026F739B83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BED1009E-AE60-43A0-A0F5-38526EFCF423\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D011585C-0E62-4233-85FA-F29A07D68DA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F226D898-F0E8-41D8-BF40-54DE9FB5426D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CB9CCD1-A67D-4800-9EC5-6E1A0B0B76E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE28C283-447A-4F83-B96B-69F96E663C1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D102063B-2434-4141-98E7-2DE501AE1728\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03B8CD03-CD31-4F4D-BA90-59435578A4F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41A994BF-1F64-480A-8AA5-748DDD0AB68C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88519F2D-AD06-4F05-BEDA-A09216F1B481\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC728978-368D-4B36-B149-70473E92BD1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD5187B1-CB86-48E8-A595-9FCFD9822C0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C660DE4-543A-4E9B-825D-CD099D08CBD8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98C1942E-16C0-4EB2-AB57-43EC6EC9C3A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"318719C9-7B01-4021-B2EF-8341254DFE6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB8FA9BA-51CA-4473-9FE1-9A32FB8C8041\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC5E64B6-77DA-44BC-B646-AE01041B1830\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2DA35E80-9E0E-4A26-B631-A61542BE4739\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EEB5367-1BB8-4ED3-8C04-ABA6BAA5AD10\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BED9E7C8-0418-4733-A496-61CCFD638859\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6566CE32-E042-424A-893B-C8A9E26E2869\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B760192E-7193-4FEF-8FFA-680AC89D45A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C020210-8EBA-41D2-BE4A-962CD902857C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"076444F1-543E-4061-9D39-415A1A889F5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B29C4AA1-30F8-4AA3-A8B5-4125CF9B66F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45BD257F-4310-44C7-A304-2F174FA93C5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sun:jre:1.4.2_28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A7B39AB-4B2E-40A2-9FB9-0E209DC7F24F\"}]}]}],\"references\":[{\"url\":\"http://blog.fortify.com/blog/2011/02/08/Double-Trouble\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053926.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053934.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130168502603566\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130270785502599\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130497132406206\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130497185606818\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://secunia.com/advisories/43048\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43280\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43295\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43304\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43333\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43378\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43400\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43659\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/44954\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://secunia.com/advisories/45022\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://secunia.com/advisories/45555\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/49198\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201406-32.xml\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IZ94423\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1PM31983\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21468358\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.debian.org/security/2011/dsa-2161\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg24029497\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg24029498\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:054\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0210.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0211.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0212.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0213.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0214.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0282.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0333.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0334.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0880.html\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id?1025062\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0365\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0377\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0379\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0422\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0434\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0605\",\"source\":\"secalert_us@oracle.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12662\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12745\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14328\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14589\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19493\",\"source\":\"secalert_us@oracle.com\"},{\"url\":\"http://blog.fortify.com/blog/2011/02/08/Double-Trouble\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053926.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053934.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130168502603566\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130270785502599\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130497132406206\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130497185606818\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/43048\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43280\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43295\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43304\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43333\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43378\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43400\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/43659\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/44954\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/45022\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/45555\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/49198\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201406-32.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1IZ94423\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg1PM31983\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21468358\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2011/dsa-2161\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg24029497\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ibm.com/support/docview.wss?uid=swg24029498\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:054\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0210.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0211.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0212.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0213.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0214.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0282.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0333.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0334.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2011-0880.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securitytracker.com/id?1025062\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2011/0365\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0377\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0379\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0422\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0434\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0605\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12662\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12745\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14328\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14589\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19493\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2011:0290
Vulnerability from csaf_redhat
Published
2011-02-22 17:22
Modified
2025-08-01 19:30
Summary
Red Hat Security Advisory: java-1.6.0-ibm security update
Notes
Topic
Updated java-1.6.0-ibm packages that fix one security issue are now
available for Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise
Linux 5 and 6 Supplementary.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
The IBM 1.6.0 Java release includes the IBM Java 2 Runtime Environment and
the IBM Java 2 Software Development Kit.
A denial of service flaw was found in the way certain strings were
converted to Double objects. A remote attacker could use this flaw to cause
Java based applications to hang, for example, if they parsed Double values
in a specially-crafted HTTP request. (CVE-2010-4476)
All users of java-1.6.0-ibm are advised to upgrade to these updated
packages, containing the IBM 1.6.0 SR9 Java release. All running instances
of IBM Java must be restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-ibm packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise\nLinux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The IBM 1.6.0 Java release includes the IBM Java 2 Runtime Environment and\nthe IBM Java 2 Software Development Kit.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nJava based applications to hang, for example, if they parsed Double values\nin a specially-crafted HTTP request. (CVE-2010-4476)\n\nAll users of java-1.6.0-ibm are advised to upgrade to these updated\npackages, containing the IBM 1.6.0 SR9 Java release. All running instances\nof IBM Java must be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0290", "url": "https://access.redhat.com/errata/RHSA-2011:0290" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://www.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0290.json" } ], "title": "Red Hat Security Advisory: java-1.6.0-ibm security update", "tracking": { "current_release_date": "2025-08-01T19:30:25+00:00", "generator": { "date": "2025-08-01T19:30:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2011:0290", "initial_release_date": "2011-02-22T17:22:00+00:00", "revision_history": [ { "date": "2011-02-22T17:22:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-02-22T12:27:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-01T19:30:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.5.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.9.0-1jpp.5.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.5.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.5.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.5.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.5.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.9.0-1jpp.5.el6?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.5.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.9.0-1jpp.5.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.5.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.5.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.5.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.5.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.9.0-1jpp.5.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.4.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.9.0-1jpp.4.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.4.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.9.0-1jpp.4.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.4.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.4.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.4.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.9.0-1jpp.4.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.9.0-1jpp.4.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.4.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.9.0-1jpp.4.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.4.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.4.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.4.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.4.el4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.5.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.9.0-1jpp.5.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.5.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.5.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.5.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.5.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.4.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.4.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.9.0-1jpp.4.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.4.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.4.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.4.el5?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.5.el6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.4.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.9.0-1jpp.4.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.4.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.9.0-1jpp.4.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.4.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.4.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.4.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc", "product": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.9.0-1jpp.4.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.9.0-1jpp.4.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.4.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.9.0-1jpp.4.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.4.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.4.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.4.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.4.el4?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.5.el6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.5.el6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.5.el6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.5.el6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.5.el6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.4.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.4.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.4.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.4.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.4.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x", "product": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x", "product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.9.0-1jpp.4.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.4.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.4.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.4.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.4.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.4.el4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.5.el6?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.4.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.4.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.4.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.4.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.4.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.4.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.4.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.4.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.4.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.4.el4?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.4.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.9.0-1jpp.4.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.4.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.9.0-1jpp.4.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.4.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.4.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.4.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386", "product": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386", "product_id": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-accessibility@1.6.0.9.0-1jpp.4.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "product": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "product_id": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-plugin@1.6.0.9.0-1jpp.4.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "product": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "product_id": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-demo@1.6.0.9.0-1jpp.4.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "product": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "product_id": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-javacomm@1.6.0.9.0-1jpp.4.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "product": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "product_id": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-src@1.6.0.9.0-1jpp.4.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "product": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "product_id": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-jdbc@1.6.0.9.0-1jpp.4.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "product_id": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.0-1jpp.4.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.0-1jpp.4.el4?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64" }, "product_reference": "java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-22T17:22:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0290" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "4AS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "4ES-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el4.x86_64", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.i386", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.ppc", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.s390x", "4WS-LACD:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-accessibility-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.4.el5.x86_64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.i386", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.ppc64", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.s390x", "5Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.4.el5.x86_64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Client-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "6ComputeNode-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Server-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-demo-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-devel-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-javacomm-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-jdbc-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-plugin-1:1.6.0.9.0-1jpp.5.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.i686", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.ppc64", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.s390x", "6Workstation-Supplementary:java-1.6.0-ibm-src-1:1.6.0.9.0-1jpp.5.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011:0282
Vulnerability from csaf_redhat
Published
2011-02-17 18:12
Modified
2025-08-04 11:44
Summary
Red Hat Security Advisory: java-1.6.0-sun security update
Notes
Topic
Updated java-1.6.0-sun packages that fix several security issues are now
available for Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise
Linux 5 and 6 Supplementary.
The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and
the Sun Java 6 Software Development Kit.
This update fixes several vulnerabilities in the Sun Java 6 Runtime
Environment and the Sun Java 6 Software Development Kit. Further
information about these flaws can be found on the "Oracle Java SE and Java
for Business Critical Patch Update Advisory" page, listed in the References
section. (CVE-2010-4422, CVE-2010-4447, CVE-2010-4448, CVE-2010-4450,
CVE-2010-4451, CVE-2010-4452, CVE-2010-4454, CVE-2010-4462, CVE-2010-4463,
CVE-2010-4465, CVE-2010-4466, CVE-2010-4467, CVE-2010-4468, CVE-2010-4469,
CVE-2010-4470, CVE-2010-4471, CVE-2010-4472, CVE-2010-4473, CVE-2010-4475,
CVE-2010-4476)
All users of java-1.6.0-sun are advised to upgrade to these updated
packages, which resolve these issues. All running instances of Sun Java
must be restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-sun packages that fix several security issues are now\navailable for Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise\nLinux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having critical\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The Sun 1.6.0 Java release includes the Sun Java 6 Runtime Environment and\nthe Sun Java 6 Software Development Kit.\n\nThis update fixes several vulnerabilities in the Sun Java 6 Runtime\nEnvironment and the Sun Java 6 Software Development Kit. Further\ninformation about these flaws can be found on the \"Oracle Java SE and Java\nfor Business Critical Patch Update Advisory\" page, listed in the References\nsection. (CVE-2010-4422, CVE-2010-4447, CVE-2010-4448, CVE-2010-4450,\nCVE-2010-4451, CVE-2010-4452, CVE-2010-4454, CVE-2010-4462, CVE-2010-4463,\nCVE-2010-4465, CVE-2010-4466, CVE-2010-4467, CVE-2010-4468, CVE-2010-4469,\nCVE-2010-4470, CVE-2010-4471, CVE-2010-4472, CVE-2010-4473, CVE-2010-4475,\nCVE-2010-4476)\n\nAll users of java-1.6.0-sun are advised to upgrade to these updated\npackages, which resolve these issues. All running instances of Sun Java\nmust be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0282", "url": "https://access.redhat.com/errata/RHSA-2011:0282" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html#AppendixJAVA", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html#AppendixJAVA" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "675942", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675942" }, { "category": "external", "summary": "675984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675984" }, { "category": "external", "summary": "676005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676005" }, { "category": "external", "summary": "676019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676019" }, { "category": "external", "summary": "676023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676023" }, { "category": "external", "summary": "676026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676026" }, { "category": "external", "summary": "677957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677957" }, { "category": "external", "summary": "677958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677958" }, { "category": "external", "summary": "677959", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677959" }, { "category": "external", "summary": "677960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677960" }, { "category": "external", "summary": "677961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677961" }, { "category": "external", "summary": "677963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677963" }, { "category": "external", "summary": "677966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677966" }, { "category": "external", "summary": "677967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677967" }, { "category": "external", "summary": "677968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677968" }, { "category": "external", "summary": "677969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677969" }, { "category": "external", "summary": "677970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677970" }, { "category": "external", "summary": "675958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675958" }, { "category": "external", "summary": "677971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677971" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0282.json" } ], "title": "Red Hat Security Advisory: java-1.6.0-sun security update", "tracking": { "current_release_date": "2025-08-04T11:44:50+00:00", "generator": { "date": "2025-08-04T11:44:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2011:0282", "initial_release_date": "2011-02-17T18:12:00+00:00", "revision_history": [ { "date": "2011-02-17T18:12:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-02-17T13:13:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T11:44:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.24-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.24-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.24-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.24-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.24-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.24-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "product": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "product_id": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.24-1jpp.1.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.24-1jpp.1.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "product_id": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.24-1jpp.1.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.24-1jpp.1.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "product_id": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.24-1jpp.1.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "product_id": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.24-1jpp.1.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.24-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.24-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.24-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.24-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.24-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "product": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "product_id": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.24-1jpp.1.el4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.24-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.24-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.24-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.24-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.24-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "product_id": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.24-1jpp.1.el5?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.24-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.24-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.24-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.24-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.24-1jpp.1.el4?arch=i586\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "product": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "product_id": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.24-1jpp.1.el4?arch=i586\u0026epoch=1" } } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "product": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "product_id": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun@1.6.0.24-1jpp.1.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "product": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "product_id": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-devel@1.6.0.24-1jpp.1.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "product": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "product_id": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-plugin@1.6.0.24-1jpp.1.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "product": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "product_id": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-src@1.6.0.24-1jpp.1.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "product": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "product_id": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-jdbc@1.6.0.24-1jpp.1.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "product": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "product_id": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-sun-demo@1.6.0.24-1jpp.1.el6?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" }, "product_reference": "java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4422", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677971" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4422" }, { "category": "external", "summary": "RHBZ#677971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4422", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4422" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4422", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4422" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4447", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677970" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Deployment, a different vulnerability than CVE-2010-4475.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4447" }, { "category": "external", "summary": "RHBZ#677970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4447", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4447" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4447", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4447" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4448", "discovery_date": "2011-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "676023" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to Networking. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue involves \"DNS cache poisoning by untrusted applets.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK DNS cache poisoning by untrusted applets (6981922)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4448" }, { "category": "external", "summary": "RHBZ#676023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4448", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4448" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4448", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4448" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK DNS cache poisoning by untrusted applets (6981922)" }, { "cve": "CVE-2010-4450", "discovery_date": "2011-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "676026" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier for Solaris and Linux; 5.0 Update 27 and earlier for Solaris and Linux; and 1.4.2_29 and earlier for Solaris and Linux allows local standalone applications to affect confidentiality, integrity, and availability via unknown vectors related to Launcher. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue is an untrusted search path vulnerability involving an empty LD_LIBRARY_PATH environment variable.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Launcher incorrect processing of empty library path entries (6983554)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4450" }, { "category": "external", "summary": "RHBZ#676026", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676026" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4450", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4450" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK Launcher incorrect processing of empty library path entries (6983554)" }, { "cve": "CVE-2010-4451", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677969" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier for Windows, when using Java Update, allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Install.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Install component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4451" }, { "category": "external", "summary": "RHBZ#677969", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677969" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4451", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4451" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4451", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4451" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Install component" }, { "cve": "CVE-2010-4452", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677968" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Deployment component in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4452" }, { "category": "external", "summary": "RHBZ#677968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677968" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4452", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4452" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4452", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4452" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4454", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677967" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs, a different vulnerability than CVE-2010-4462 and CVE-2010-4473.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Sound component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4454" }, { "category": "external", "summary": "RHBZ#677967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677967" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4454", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4454" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4454", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4454" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Sound component" }, { "cve": "CVE-2010-4462", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677966" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs, a different vulnerability than CVE-2010-4454 and CVE-2010-4473.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Sound component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4462" }, { "category": "external", "summary": "RHBZ#677966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677966" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4462", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4462" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4462", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4462" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Sound component" }, { "cve": "CVE-2010-4463", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677963" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 21 through 6 Update 23 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4463" }, { "category": "external", "summary": "RHBZ#677963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677963" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4463", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4463" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4463", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4463" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4465", "discovery_date": "2011-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "675984" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue is related to the lack of framework support by AWT event dispatch, and/or \"clipboard access in Applets.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Swing timer-based security manager bypass (6907662)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4465" }, { "category": "external", "summary": "RHBZ#675984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675984" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4465", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4465" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4465", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4465" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Swing timer-based security manager bypass (6907662)" }, { "cve": "CVE-2010-4466", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677961" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier for Windows, Solaris, and, Linux; 5.0 Update 27 and earlier for Windows; and 1.4.2_29 and earlier for Windows allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4466" }, { "category": "external", "summary": "RHBZ#677961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677961" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4466", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4466" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4467", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677960" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 10 through 6 Update 23 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4467" }, { "category": "external", "summary": "RHBZ#677960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677960" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4467", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4467" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4467", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4467" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4468", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677959" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, and 5.0 Update 27 and earlier, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity via unknown vectors related to JDBC.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in JDBC component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4468" }, { "category": "external", "summary": "RHBZ#677959", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677959" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4468", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4468" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4468", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4468" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK unspecified vulnerability in JDBC component" }, { "cve": "CVE-2010-4469", "discovery_date": "2008-08-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "675958" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to HotSpot. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue is heap corruption related to the Verifier and \"backward jsrs.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Hotspot verifier heap corruption (6878713)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4469" }, { "category": "external", "summary": "RHBZ#675958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675958" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4469", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4469" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4469", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4469" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Hotspot verifier heap corruption (6878713)" }, { "cve": "CVE-2010-4470", "discovery_date": "2011-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "676005" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23, and, and earlier allows remote attackers to affect availability via unknown vectors related to JAXP and unspecified APIs. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue is related to \"Features set on SchemaFactory not inherited by Validator.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK JAXP untrusted component state manipulation (6927050)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4470" }, { "category": "external", "summary": "RHBZ#676005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4470", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4470" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4470", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4470" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK JAXP untrusted component state manipulation (6927050)" }, { "cve": "CVE-2010-4471", "discovery_date": "2010-07-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "676019" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, and 5.0 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to 2D. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue is related to the exposure of system properties via vectors related to Font.createFont and exception text.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Java2D font-related system property leak (6985453)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4471" }, { "category": "external", "summary": "RHBZ#676019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4471", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4471" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4471", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4471" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK Java2D font-related system property leak (6985453)" }, { "cve": "CVE-2010-4472", "discovery_date": "2011-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "675942" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier allows remote attackers to affect availability, related to XML Digital Signature and unspecified APIs. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue involves the replacement of the \"XML DSig Transform or C14N algorithm implementations.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK untrusted code allowed to replace DSIG/C14N implementation (6994263)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4472" }, { "category": "external", "summary": "RHBZ#675942", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675942" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4472", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4472" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4472", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4472" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK untrusted code allowed to replace DSIG/C14N implementation (6994263)" }, { "cve": "CVE-2010-4473", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677958" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs, a different vulnerability than CVE-2010-4454 and CVE-2010-4462.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Sound component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4473" }, { "category": "external", "summary": "RHBZ#677958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677958" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4473", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4473" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Sound component" }, { "cve": "CVE-2010-4475", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677957" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Deployment, a different vulnerability than CVE-2010-4447.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4475" }, { "category": "external", "summary": "RHBZ#677957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677957" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4475", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4475" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-17T18:12:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0282" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4AS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4Desktop-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4ES-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el4.x86_64", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.i586", "4WS-LACD:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el4.x86_64", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el5.x86_64", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.i586", "5Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el5.x86_64", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Client-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6ComputeNode-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Server-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-demo-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-devel-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-jdbc-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-plugin-1:1.6.0.24-1jpp.1.el6.x86_64", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.i686", "6Workstation-Supplementary:java-1.6.0-sun-src-1:1.6.0.24-1jpp.1.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011:0348
Vulnerability from csaf_redhat
Published
2011-03-11 00:35
Modified
2025-08-01 19:31
Summary
Red Hat Security Advisory: tomcat6 security update
Notes
Topic
Updated tomcat6 packages that fix two security issues are now available for
JBoss Enterprise Web Server 1.0.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
Apache Tomcat is a servlet container for the Java Servlet and JavaServer
Pages (JSP) technologies.
A denial of service flaw was found in the way certain strings were
converted to Double objects. A remote attacker could use this flaw to cause
Tomcat to hang via a specially-crafted HTTP request. (CVE-2010-4476)
A flaw was found in the Tomcat NIO (Non-Blocking I/O) connector. A remote
attacker could use this flaw to cause a denial of service (out-of-memory
condition) via a specially-crafted request containing a large NIO buffer
size request value. (CVE-2011-0534)
Users of Tomcat should upgrade to these updated packages, which contain
backported patches to correct these issues. Tomcat must be restarted for
this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated tomcat6 packages that fix two security issues are now available for\nJBoss Enterprise Web Server 1.0.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nTomcat to hang via a specially-crafted HTTP request. (CVE-2010-4476)\n\nA flaw was found in the Tomcat NIO (Non-Blocking I/O) connector. A remote\nattacker could use this flaw to cause a denial of service (out-of-memory\ncondition) via a specially-crafted request containing a large NIO buffer\nsize request value. (CVE-2011-0534)\n\nUsers of Tomcat should upgrade to these updated packages, which contain\nbackported patches to correct these issues. Tomcat must be restarted for\nthis update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0348", "url": "https://access.redhat.com/errata/RHSA-2011:0348" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://tomcat.apache.org/security-6.html", "url": "http://tomcat.apache.org/security-6.html" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "675338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675338" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0348.json" } ], "title": "Red Hat Security Advisory: tomcat6 security update", "tracking": { "current_release_date": "2025-08-01T19:31:02+00:00", "generator": { "date": "2025-08-01T19:31:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2011:0348", "initial_release_date": "2011-03-11T00:35:00+00:00", "revision_history": [ { "date": "2011-03-11T00:35:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-03-10T19:38:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-01T19:31:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product": { "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product": { "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el5" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" }, { "branches": [ { "category": "product_version", "name": "tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_id": "tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.24-11.patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_id": "tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.24-11.patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_id": "tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.24-11.patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_id": "tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.24-11.patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_id": "tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.24-11.patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_id": "tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.24-11.patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_id": "tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.24-11.patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_id": "tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.24-11.patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_id": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.24-11.patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "product": { "name": "tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_id": "tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.24-11.patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_id": "tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-el-1.0-api@6.0.24-11.patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_id": "tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.24-11.patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_id": "tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.24-11.patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_id": "tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.24-11.patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_id": "tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.24-11.patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-lib-0:6.0.24-11.patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-lib-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_id": "tomcat6-lib-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.24-11.patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_id": "tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.24-11.patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_id": "tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.24-11.patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_id": "tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.24-11.patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el5.noarch", "product": { "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_id": "tomcat6-0:6.0.24-11.patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.24-11.patch_03.ep5.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "product": { "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "product_id": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.24-11.patch_03.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el5.src", "product": { "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el5.src", "product_id": "tomcat6-0:6.0.24-11.patch_03.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.24-11.patch_03.ep5.el5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src" }, "product_reference": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src" }, "product_reference": "tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-0:6.0.24-11.patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-11.patch_03.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.src" }, "product_reference": "tomcat6-0:6.0.24-11.patch_03.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.24-11.patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-lib-0:6.0.24-11.patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.src", "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-11T00:35:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.src", "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0348" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.src", "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" }, { "cve": "CVE-2011-0534", "discovery_date": "2011-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "675338" } ], "notes": [ { "category": "description", "text": "Apache Tomcat 7.0.0 through 7.0.6 and 6.0.0 through 6.0.30 does not enforce the maxHttpHeaderSize limit for requests involving the NIO HTTP connector, which allows remote attackers to cause a denial of service (OutOfMemoryError) via a crafted request.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: remote DoS via NIO connector", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.src", "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0534" }, { "category": "external", "summary": "RHBZ#675338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675338" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0534", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0534" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0534", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0534" } ], "release_date": "2011-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-11T00:35:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.src", "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0348" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el4.src", "4ES-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el4.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-0:6.0.24-11.patch_03.ep5.el5.src", "5Server-JBEWS-5.0.0:tomcat6-admin-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-docs-webapp-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-el-1.0-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-javadoc-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-jsp-2.1-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-lib-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-log4j-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-servlet-2.5-api-0:6.0.24-11.patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat6-webapps-0:6.0.24-11.patch_03.ep5.el5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: remote DoS via NIO connector" } ] }
rhsa-2011:0350
Vulnerability from csaf_redhat
Published
2011-03-11 01:04
Modified
2025-08-01 19:30
Summary
Red Hat Security Advisory: tomcat5 and tomcat6 security update
Notes
Topic
A patch for JBoss Enterprise Web Server 1.0.1 that fixes two security
issues is now available from the Red Hat Customer Portal.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
Apache Tomcat is a servlet container for the Java Servlet and JavaServer
Pages (JSP) technologies.
A denial of service flaw was found in the way certain strings were
converted to Double objects. A remote attacker could use this flaw to cause
Tomcat 5 or 6 to hang via a specially-crafted HTTP request. (CVE-2010-4476)
A flaw was found in the Tomcat 6 NIO (Non-Blocking I/O) connector. A remote
attacker could use this flaw to cause a denial of service (out-of-memory
condition) via a specially-crafted request containing a large NIO buffer
size request value. (CVE-2011-0534)
All users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat
Customer Portal are advised to apply this patch.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A patch for JBoss Enterprise Web Server 1.0.1 that fixes two security\nissues is now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nTomcat 5 or 6 to hang via a specially-crafted HTTP request. (CVE-2010-4476)\n\nA flaw was found in the Tomcat 6 NIO (Non-Blocking I/O) connector. A remote\nattacker could use this flaw to cause a denial of service (out-of-memory\ncondition) via a specially-crafted request containing a large NIO buffer\nsize request value. (CVE-2011-0534)\n\nAll users of JBoss Enterprise Web Server 1.0.1 as provided from the Red Hat\nCustomer Portal are advised to apply this patch.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0350", "url": "https://access.redhat.com/errata/RHSA-2011:0350" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://tomcat.apache.org/security-5.html", "url": "http://tomcat.apache.org/security-5.html" }, { "category": "external", "summary": "http://tomcat.apache.org/security-6.html", "url": "http://tomcat.apache.org/security-6.html" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=1.0.1", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=webserver\u0026downloadType=securityPatches\u0026version=1.0.1" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "675338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675338" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0350.json" } ], "title": "Red Hat Security Advisory: tomcat5 and tomcat6 security update", "tracking": { "current_release_date": "2025-08-01T19:30:57+00:00", "generator": { "date": "2025-08-01T19:30:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2011:0350", "initial_release_date": "2011-03-11T01:04:00+00:00", "revision_history": [ { "date": "2011-03-11T01:04:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-03-10T20:09:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-01T19:30:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 1.0", "product": { "name": "Red Hat JBoss Web Server 1.0", "product_id": "Red Hat JBoss Web Server 1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1.0" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-11T01:04:00+00:00", "details": "The References section of this erratum contains a patch download link (you\nmust log in to download the patch). Before applying the patch, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). After applying the patch, the JBoss\nserver process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0350" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" }, { "cve": "CVE-2011-0534", "discovery_date": "2011-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "675338" } ], "notes": [ { "category": "description", "text": "Apache Tomcat 7.0.0 through 7.0.6 and 6.0.0 through 6.0.30 does not enforce the maxHttpHeaderSize limit for requests involving the NIO HTTP connector, which allows remote attackers to cause a denial of service (OutOfMemoryError) via a crafted request.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: remote DoS via NIO connector", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 1.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0534" }, { "category": "external", "summary": "RHBZ#675338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675338" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0534", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0534" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0534", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0534" } ], "release_date": "2011-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-11T01:04:00+00:00", "details": "The References section of this erratum contains a patch download link (you\nmust log in to download the patch). Before applying the patch, backup your\nexisting JBoss Enterprise Web Server installation (including all\napplications and configuration files). After applying the patch, the JBoss\nserver process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss Web Server 1.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0350" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 1.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: remote DoS via NIO connector" } ] }
rhsa-2011:0291
Vulnerability from csaf_redhat
Published
2011-02-22 17:17
Modified
2025-08-01 19:30
Summary
Red Hat Security Advisory: java-1.5.0-ibm security update
Notes
Topic
Updated java-1.5.0-ibm packages that fix one security issue are now
available for Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise
Linux 5 and 6 Supplementary.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment and
the IBM Java 2 Software Development Kit.
A denial of service flaw was found in the way certain strings were
converted to Double objects. A remote attacker could use this flaw to cause
Java based applications to hang, for example, if they parsed Double values
in a specially-crafted HTTP request. (CVE-2010-4476)
All users of java-1.5.0-ibm are advised to upgrade to these updated
packages, containing the IBM 1.5.0 SR12-FP3 Java release. All running
instances of IBM Java must be restarted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.5.0-ibm packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 4 Extras, and Red Hat Enterprise\nLinux 5 and 6 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The IBM 1.5.0 Java release includes the IBM Java 2 Runtime Environment and\nthe IBM Java 2 Software Development Kit.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nJava based applications to hang, for example, if they parsed Double values\nin a specially-crafted HTTP request. (CVE-2010-4476)\n\nAll users of java-1.5.0-ibm are advised to upgrade to these updated\npackages, containing the IBM 1.5.0 SR12-FP3 Java release. All running\ninstances of IBM Java must be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0291", "url": "https://access.redhat.com/errata/RHSA-2011:0291" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://www.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0291.json" } ], "title": "Red Hat Security Advisory: java-1.5.0-ibm security update", "tracking": { "current_release_date": "2025-08-01T19:30:30+00:00", "generator": { "date": "2025-08-01T19:30:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2011:0291", "initial_release_date": "2011-02-22T17:17:00+00:00", "revision_history": [ { "date": "2011-02-22T17:17:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-02-22T12:22:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-01T19:30:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:6" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.2.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.12.3-1jpp.2.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.2.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.12.3-1jpp.2.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.2.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.2.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.3.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.12.3-1jpp.3.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.3.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.3.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.3.el6?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.12.3-1jpp.2.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.2.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.2.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.2.el4?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.2.el4?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.12.3-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.12.3-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.12.3-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386", "product": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386", "product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.12.3-1jpp.2.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.12.3-1jpp.2.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.2.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.12.3-1jpp.2.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.2.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.12.3-1jpp.2.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.2.el4?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.2.el4?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.2.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.12.3-1jpp.2.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.2.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.2.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.2.el5?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.3.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.12.3-1jpp.3.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.3.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.3.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.3.el6?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.12.3-1jpp.2.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.2.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.2.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.2.el4?arch=ppc64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.2.el4?arch=ppc64\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.2.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.12.3-1jpp.2.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.2.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.12.3-1jpp.2.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc", "product": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.12.3-1jpp.2.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.2.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.12.3-1jpp.2.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.2.el5?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.3.el6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.12.3-1jpp.3.el6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.12.3-1jpp.3.el6?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.12.3-1jpp.2.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.2.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.12.3-1jpp.2.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.2.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.12.3-1jpp.2.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.2.el4?arch=ppc\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.2.el4?arch=ppc\u0026epoch=1" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.2.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.2.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x", "product": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x", "product_id": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-accessibility@1.5.0.12.3-1jpp.2.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.2.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.2.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.3.el6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.3.el6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.3.el6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.3.el6?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.2.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.2.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.2.el4?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.2.el4?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.2.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.2.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.12.3-1jpp.2.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.2.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.2.el5?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.3.el6?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.12.3-1jpp.3.el6?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.2.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.12.3-1jpp.2.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.2.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.2.el4?arch=s390\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.2.el4?arch=s390\u0026epoch=1" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "product": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "product_id": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-demo@1.5.0.12.3-1jpp.3.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "product": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "product_id": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-javacomm@1.5.0.12.3-1jpp.3.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "product": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "product_id": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-plugin@1.5.0.12.3-1jpp.3.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "product": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "product_id": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-jdbc@1.5.0.12.3-1jpp.3.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "product": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "product_id": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm@1.5.0.12.3-1jpp.3.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "product": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "product_id": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-src@1.5.0.12.3-1jpp.3.el6?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "product": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "product_id": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.5.0-ibm-devel@1.5.0.12.3-1jpp.3.el6?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 6)", "product_id": "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node Supplementary (v. 6)", "product_id": "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6ComputeNode-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 6)", "product_id": "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390" }, "product_reference": "java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc" }, "product_reference": "java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "relates_to_product_reference": "6Workstation-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation Supplementary (v. 6)", "product_id": "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64" }, "product_reference": "java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "relates_to_product_reference": "6Workstation-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "6Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "6ComputeNode-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "6ComputeNode-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "6Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Workstation-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "6Workstation-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-22T17:17:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "6Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "6ComputeNode-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "6ComputeNode-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "6Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Workstation-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "6Workstation-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0291" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "4AS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "4AS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "4AS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "4AS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "4Desktop-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "4ES-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "4ES-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "4ES-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "4ES-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.s390x", "4WS-LACD:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.s390x", "4WS-LACD:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.s390x", "4WS-LACD:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el4.x86_64", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.i386", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.ppc64", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.s390x", "4WS-LACD:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el4.x86_64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-accessibility-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.2.el5.x86_64", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.i386", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.ppc64", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.s390x", "5Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.2.el5.x86_64", "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Client-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Client-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Client-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Client-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "6Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Client-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "6ComputeNode-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "6ComputeNode-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "6ComputeNode-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6ComputeNode-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "6ComputeNode-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "6ComputeNode-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "6ComputeNode-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Server-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Server-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Server-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Server-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "6Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Server-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Workstation-Supplementary:java-1.5.0-ibm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Workstation-Supplementary:java-1.5.0-ibm-demo-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Workstation-Supplementary:java-1.5.0-ibm-devel-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-javacomm-1:1.5.0.12.3-1jpp.3.el6.x86_64", "6Workstation-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Workstation-Supplementary:java-1.5.0-ibm-jdbc-1:1.5.0.12.3-1jpp.3.el6.s390", "6Workstation-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-plugin-1:1.5.0.12.3-1jpp.3.el6.ppc", "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.i686", "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.ppc64", "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.s390x", "6Workstation-Supplementary:java-1.5.0-ibm-src-1:1.5.0.12.3-1jpp.3.el6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011:0349
Vulnerability from csaf_redhat
Published
2011-03-11 00:54
Modified
2025-08-01 19:31
Summary
Red Hat Security Advisory: tomcat5 security update
Notes
Topic
Updated tomcat5 packages that fix one security issue are now available for
JBoss Enterprise Web Server 1.0.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
Apache Tomcat is a servlet container for the Java Servlet and JavaServer
Pages (JSP) technologies.
A denial of service flaw was found in the way certain strings were
converted to Double objects. A remote attacker could use this flaw to cause
Tomcat to hang via a specially-crafted HTTP request. (CVE-2010-4476)
Users of Tomcat should upgrade to these updated packages, which contain a
backported patch to correct this issue. Tomcat must be restarted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated tomcat5 packages that fix one security issue are now available for\nJBoss Enterprise Web Server 1.0.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nTomcat to hang via a specially-crafted HTTP request. (CVE-2010-4476)\n\nUsers of Tomcat should upgrade to these updated packages, which contain a\nbackported patch to correct this issue. Tomcat must be restarted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0349", "url": "https://access.redhat.com/errata/RHSA-2011:0349" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://tomcat.apache.org/security-5.html", "url": "http://tomcat.apache.org/security-5.html" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0349.json" } ], "title": "Red Hat Security Advisory: tomcat5 security update", "tracking": { "current_release_date": "2025-08-01T19:31:06+00:00", "generator": { "date": "2025-08-01T19:31:06+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2011:0349", "initial_release_date": "2011-03-11T00:54:00+00:00", "revision_history": [ { "date": "2011-03-11T00:54:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-03-10T19:58:54+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-01T19:31:06+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el5" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product": { "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product": { "name": "Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:1::el4" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" }, { "branches": [ { "category": "product_version", "name": "tomcat5-admin-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-admin-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-admin-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-common-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-common-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-common-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jasper-eclipse-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-jasper-eclipse-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-jasper-eclipse-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-eclipse@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-server-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-server-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-server-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jasper-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-jasper-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-jasper-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-servlet-2.4-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-servlet-2.4-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-parent-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-parent-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-parent-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-parent@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-jsp-2.0-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-jsp-2.0-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jasper-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "product": { "name": "tomcat5-jasper-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_id": "tomcat5-jasper-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.28-12_patch_03.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-eclipse@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-parent@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "product": { "name": "tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_id": "tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.28-18_patch_03.ep5.el4?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "tomcat5-0:5.5.28-12_patch_03.ep5.el5.src", "product": { "name": "tomcat5-0:5.5.28-12_patch_03.ep5.el5.src", "product_id": "tomcat5-0:5.5.28-12_patch_03.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.28-12_patch_03.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.src", "product": { "name": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.src", "product_id": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.28-18_patch_03.ep5.el4?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.src" }, "product_reference": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 AS", "product_id": "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.src as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.src" }, "product_reference": "tomcat5-0:5.5.28-18_patch_03.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch as a component of Red Hat JBoss Web Server 1.0 for RHEL 4 ES", "product_id": "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch" }, "product_reference": "tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.28-12_patch_03.ep5.el5.src as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-12_patch_03.ep5.el5.src" }, "product_reference": "tomcat5-0:5.5.28-12_patch_03.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-admin-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-common-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-jasper-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-eclipse-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-jasper-eclipse-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-parent-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-parent-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-server-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Web Server 1 for RHEL 5 Server", "product_id": "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch" }, "product_reference": "tomcat5-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWS-5.0.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.src", "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-12_patch_03.ep5.el5.src", "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-11T00:54:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.src", "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-12_patch_03.ep5.el5.src", "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0349" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.src", "4AS-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4AS-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-0:5.5.28-18_patch_03.ep5.el4.src", "4ES-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-18_patch_03.ep5.el4.noarch", "4ES-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-18_patch_03.ep5.el4.noarch", "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-0:5.5.28-12_patch_03.ep5.el5.src", "5Server-JBEWS-5.0.0:tomcat5-admin-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-common-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jasper-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jasper-eclipse-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jasper-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-jsp-2.0-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-parent-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-server-lib-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-servlet-2.4-api-javadoc-0:5.5.28-12_patch_03.ep5.el5.noarch", "5Server-JBEWS-5.0.0:tomcat5-webapps-0:5.5.28-12_patch_03.ep5.el5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011:0299
Vulnerability from csaf_redhat
Published
2011-02-23 18:40
Modified
2025-08-01 19:30
Summary
Red Hat Security Advisory: java-1.4.2-ibm-sap security update
Notes
Topic
Updated java-1.4.2-ibm-sap packages that fix one security issue are now
available for Red Hat Enterprise Linux 4, 5 and 6 for SAP.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
The IBM 1.4.2 SR13-FP8 Java release includes the IBM Java 2 Runtime
Environment and the IBM Java 2 Software Development Kit.
A denial of service flaw was found in the way certain strings were
converted to Double objects. A remote attacker could use this flaw to cause
Java based applications to hang, for example, if they parsed Double values
in a specially-crafted HTTP request. (CVE-2010-4476)
Note: The java-1.4.2-ibm packages were renamed to java-1.4.2-ibm-sap to
correct a naming overlap; however, java-1.4.2-ibm-sap does not
automatically obsolete the previous java-1.4.2-ibm packages for Red Hat
Enterprise Linux 4 and 5 for SAP. Refer to the RHBA-2010:0491 and
RHBA-2010:0530 advisories, listed in the References, for further
information.
All users of java-1.4.2-ibm-sap for Red Hat Enterprise Linux 4, 5 and 6 for
SAP are advised to upgrade to these updated packages, which contain the IBM
1.4.2 SR13-FP8 Java release. All running instances of IBM Java must be
restarted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.4.2-ibm-sap packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 4, 5 and 6 for SAP.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The IBM 1.4.2 SR13-FP8 Java release includes the IBM Java 2 Runtime\nEnvironment and the IBM Java 2 Software Development Kit.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nJava based applications to hang, for example, if they parsed Double values\nin a specially-crafted HTTP request. (CVE-2010-4476)\n\nNote: The java-1.4.2-ibm packages were renamed to java-1.4.2-ibm-sap to\ncorrect a naming overlap; however, java-1.4.2-ibm-sap does not\nautomatically obsolete the previous java-1.4.2-ibm packages for Red Hat\nEnterprise Linux 4 and 5 for SAP. Refer to the RHBA-2010:0491 and\nRHBA-2010:0530 advisories, listed in the References, for further\ninformation.\n\nAll users of java-1.4.2-ibm-sap for Red Hat Enterprise Linux 4, 5 and 6 for\nSAP are advised to upgrade to these updated packages, which contain the IBM\n1.4.2 SR13-FP8 Java release. All running instances of IBM Java must be\nrestarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0299", "url": "https://access.redhat.com/errata/RHSA-2011:0299" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://www.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "https://rhn.redhat.com/errata/RHBA-2010-0491.html", "url": "https://rhn.redhat.com/errata/RHBA-2010-0491.html" }, { "category": "external", "summary": "https://rhn.redhat.com/errata/RHBA-2010-0530.html", "url": "https://rhn.redhat.com/errata/RHBA-2010-0530.html" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0299.json" } ], "title": "Red Hat Security Advisory: java-1.4.2-ibm-sap security update", "tracking": { "current_release_date": "2025-08-01T19:30:40+00:00", "generator": { "date": "2025-08-01T19:30:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2011:0299", "initial_release_date": "2011-02-23T18:40:00+00:00", "revision_history": [ { "date": "2011-02-23T18:40:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-02-23T13:41:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-01T19:30:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "RHEL 4 AS for SAP", "product": { "name": "RHEL 4 AS for SAP", "product_id": "4AS-SAP", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_sap:4" } } }, { "category": "product_name", "name": "RHEL 5 Server for SAP", "product": { "name": "RHEL 5 Server for SAP", "product_id": "5Server-SAP", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras_sap:5" } } } ], "category": "product_family", "name": "RHEL for SAP" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product": { "name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product_id": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-devel@1.4.2.13.8.sap-1jpp.2.el4_8?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product": { "name": "java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product_id": "java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap@1.4.2.13.8.sap-1jpp.2.el4_8?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product": { "name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product_id": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-demo@1.4.2.13.8.sap-1jpp.2.el4_8?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product": { "name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product_id": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-javacomm@1.4.2.13.8.sap-1jpp.2.el4_8?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product": { "name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product_id": "java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-src@1.4.2.13.8.sap-1jpp.2.el4_8?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product": { "name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product_id": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-demo@1.4.2.13.8.sap-1jpp.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product": { "name": "java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product_id": "java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap@1.4.2.13.8.sap-1jpp.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product": { "name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product_id": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-devel@1.4.2.13.8.sap-1jpp.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product": { "name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product_id": "java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-src@1.4.2.13.8.sap-1jpp.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product": { "name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product_id": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-sap-javacomm@1.4.2.13.8.sap-1jpp.2.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64 as a component of RHEL 4 AS for SAP", "product_id": "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "relates_to_product_reference": "4AS-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64 as a component of RHEL 4 AS for SAP", "product_id": "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "relates_to_product_reference": "4AS-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64 as a component of RHEL 4 AS for SAP", "product_id": "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "relates_to_product_reference": "4AS-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64 as a component of RHEL 4 AS for SAP", "product_id": "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "relates_to_product_reference": "4AS-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64 as a component of RHEL 4 AS for SAP", "product_id": "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "relates_to_product_reference": "4AS-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-SAP" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64 as a component of RHEL 5 Server for SAP", "product_id": "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "relates_to_product_reference": "5Server-SAP" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-23T18:40:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0299" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "4AS-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el4_8.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-demo-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-devel-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-javacomm-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64", "5Server-SAP:java-1.4.2-ibm-sap-src-0:1.4.2.13.8.sap-1jpp.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011:0333
Vulnerability from csaf_redhat
Published
2011-03-09 18:36
Modified
2025-08-01 19:30
Summary
Red Hat Security Advisory: JBoss Enterprise SOA Platform 4.3.CP04 and 5.0.2 security update
Notes
Topic
Updated jbossweb-2.0.0.jar and jbossweb-2.1.10.jar files for JBoss
Enterprise SOA Platform 4.3.CP04 and 5.0.2 that fix one security issue are
now available from the Red Hat Customer Portal.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
JBoss Enterprise SOA Platform is the next-generation ESB and business
process automation infrastructure. JBoss Enterprise SOA Platform allows IT
to leverage existing (MoM and EAI), modern (SOA and BPM-Rules), and future
(EDA and CEP) integration methodologies to dramatically improve business
process execution speed and quality.
A denial of service flaw was found in the way certain strings were
converted to Double objects. A remote attacker could use this flaw to cause
JBoss Web Server to hang via a specially-crafted HTTP request.
(CVE-2010-4476)
All users of JBoss Enterprise SOA Platform 4.3.CP04 and 5.0.2 as provided
from the Red Hat Customer Portal are advised to install this update. Refer
to the Solution section of this erratum for update instructions.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated jbossweb-2.0.0.jar and jbossweb-2.1.10.jar files for JBoss\nEnterprise SOA Platform 4.3.CP04 and 5.0.2 that fix one security issue are\nnow available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "JBoss Enterprise SOA Platform is the next-generation ESB and business\nprocess automation infrastructure. JBoss Enterprise SOA Platform allows IT\nto leverage existing (MoM and EAI), modern (SOA and BPM-Rules), and future\n(EDA and CEP) integration methodologies to dramatically improve business\nprocess execution speed and quality.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nJBoss Web Server to hang via a specially-crafted HTTP request.\n(CVE-2010-4476)\n\nAll users of JBoss Enterprise SOA Platform 4.3.CP04 and 5.0.2 as provided\nfrom the Red Hat Customer Portal are advised to install this update. Refer\nto the Solution section of this erratum for update instructions.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0333", "url": "https://access.redhat.com/errata/RHSA-2011:0333" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0333.json" } ], "title": "Red Hat Security Advisory: JBoss Enterprise SOA Platform 4.3.CP04 and 5.0.2 security update", "tracking": { "current_release_date": "2025-08-01T19:30:45+00:00", "generator": { "date": "2025-08-01T19:30:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2011:0333", "initial_release_date": "2011-03-09T18:36:00+00:00", "revision_history": [ { "date": "2011-03-09T18:36:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-03-09T13:40:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-01T19:30:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss SOA Platform 4.3", "product": { "name": "Red Hat JBoss SOA Platform 4.3", "product_id": "Red Hat JBoss SOA Platform 4.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_soa_platform:4.3" } } }, { "category": "product_name", "name": "Red Hat JBoss SOA Platform 5.0", "product": { "name": "Red Hat JBoss SOA Platform 5.0", "product_id": "Red Hat JBoss SOA Platform 5.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_soa_platform:5.0" } } } ], "category": "product_family", "name": "Red Hat JBoss Middleware" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss SOA Platform 4.3", "Red Hat JBoss SOA Platform 5.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-09T18:36:00+00:00", "details": "Updated jbossweb-2.0.0.jar (for 4.3.CP04) and jbossweb-2.1.10.jar (for\n5.0.2) files that fix CVE-2010-4476 for JBoss Enterprise SOA Platform\n4.3.CP04 and 5.0.2 are available from the Red Hat Customer Portal. To\ndownload and install the updated files:\n\n1) Log into the Customer Portal: https://access.redhat.com/login\n\n2) Navigate to\nhttps://access.redhat.com/jbossnetwork/restricted/listSoftware.html\n\n3) On the left-hand side menu, under \"JBoss Enterprise Platforms\" click\n\"SOA Platform\". Then, using the \"Version:\" drop down menu, select the SOA\nPlatform version you are using, such as \"4.3.0.GA_CP04\" or \"5.0.2 GA\".\n\n4) From the \"Security Advisories\" tab, click the \"CVE-2010-4476 JBossweb\nupdate fixing JDK double bug...\" link in the \"Download File\" column. The\n\"Software Details\" page is displayed, where you can download the update\nand view installation instructions.\n\n5) Backup your existing jbossweb.jar file (refer to the \"Software Details\"\npage, from step 4, for the location of this file).\n\n6) After downloading the update, ensure you backed up your existing\njbossweb.jar file as per step 5, and then follow the manual installation\nstep on the \"Software Details\" page. Note that it is recommended to halt\nthe JBoss Enterprise SOA Platform server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the JBoss Enterprise SOA Platform server by starting the\nJBoss Application Server process.", "product_ids": [ "Red Hat JBoss SOA Platform 4.3", "Red Hat JBoss SOA Platform 5.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0333" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss SOA Platform 4.3", "Red Hat JBoss SOA Platform 5.0" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011:0210
Vulnerability from csaf_redhat
Published
2011-02-10 19:30
Modified
2025-08-01 19:31
Summary
Red Hat Security Advisory: jbossweb security update
Notes
Topic
Updated jbossweb packages that fix one security issue are now available for
JBoss Enterprise Application Platform 4.2, 4.3, and 5.1, for Red Hat
Enterprise Linux 4 and 5.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
JBoss Web Server is the web container, based on Apache Tomcat, in JBoss
Enterprise Application Platform. It provides a single deployment platform
for the JavaServer Pages (JSP) and Java Servlet technologies.
A denial of service flaw was found in the way certain strings were
converted to Double objects. A remote attacker could use this flaw to cause
JBoss Web Server to hang via a specially-crafted HTTP request.
(CVE-2010-4476)
Users of JBoss Web Server should upgrade to these updated packages, which
contain a backported patch to correct this issue. The JBoss server process
must be restarted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated jbossweb packages that fix one security issue are now available for\nJBoss Enterprise Application Platform 4.2, 4.3, and 5.1, for Red Hat\nEnterprise Linux 4 and 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "JBoss Web Server is the web container, based on Apache Tomcat, in JBoss\nEnterprise Application Platform. It provides a single deployment platform\nfor the JavaServer Pages (JSP) and Java Servlet technologies.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nJBoss Web Server to hang via a specially-crafted HTTP request.\n(CVE-2010-4476)\n\nUsers of JBoss Web Server should upgrade to these updated packages, which\ncontain a backported patch to correct this issue. The JBoss server process\nmust be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0210", "url": "https://access.redhat.com/errata/RHSA-2011:0210" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0210.json" } ], "title": "Red Hat Security Advisory: jbossweb security update", "tracking": { "current_release_date": "2025-08-01T19:31:20+00:00", "generator": { "date": "2025-08-01T19:31:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2011:0210", "initial_release_date": "2011-02-10T19:30:00+00:00", "revision_history": [ { "date": "2011-02-10T19:30:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-02-10T14:30:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-01T19:31:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3.0::el5" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2.0::el5" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product": { "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEAP-5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product": { "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEAP-5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEAP-5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5::el5" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "product": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "product_id": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.0.0-8.CP15.patch01.0jpp.ep1.1.el4?arch=src" } } }, { "category": "product_version", "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src", "product": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src", "product_id": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.0.0-8.CP15.patch01.0jpp.ep1.1.el5?arch=src" } } }, { "category": "product_version", "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "product": { "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "product_id": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.1.10-5.patch01.1.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "product": { "name": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "product_id": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.1.10-5.patch01.1.1.ep5.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "product": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "product_id": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.0.0-8.CP15.patch01.0jpp.ep1.1.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch", "product": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch", "product_id": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.0.0-8.CP15.patch01.0jpp.ep1.1.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product": { "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_id": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb-servlet-2.5-api@2.1.10-5.patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product": { "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_id": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.1.10-5.patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product": { "name": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_id": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb-lib@2.1.10-5.patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product": { "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_id": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb-jsp-2.1-api@2.1.10-5.patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product": { "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_id": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb-jsp-2.1-api@2.1.10-5.patch01.1.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product": { "name": "jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_id": "jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb-lib@2.1.10-5.patch01.1.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product": { "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_id": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb-servlet-2.5-api@2.1.10-5.patch01.1.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product": { "name": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_id": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.1.10-5.patch01.1.1.ep5.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch" }, "product_reference": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 AS", "product_id": "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src" }, "product_reference": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "relates_to_product_reference": "4AS-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src" }, "product_reference": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "relates_to_product_reference": "4AS-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEAP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch" }, "product_reference": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 AS", "product_id": "4AS-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src" }, "product_reference": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "relates_to_product_reference": "4AS-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch" }, "product_reference": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 4 ES", "product_id": "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src" }, "product_reference": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "relates_to_product_reference": "4ES-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src" }, "product_reference": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "relates_to_product_reference": "4ES-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEAP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch" }, "product_reference": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 4 ES", "product_id": "4ES-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src" }, "product_reference": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "relates_to_product_reference": "4ES-JBEAP" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch" }, "product_reference": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.2.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src" }, "product_reference": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.2.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch" }, "product_reference": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src as a component of Red Hat JBoss Enterprise Application Platform 4.3.0 for RHEL 5 Server", "product_id": "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src" }, "product_reference": "jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src", "relates_to_product_reference": "5Server-JBEAP-4.3.0" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" }, "product_reference": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src" }, "product_reference": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "relates_to_product_reference": "5Server-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" }, "product_reference": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEAP-5:jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" }, "product_reference": "jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" }, "product_reference": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-5" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "4AS-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "4AS-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "4ES-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "4ES-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src", "5Server-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "5Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEAP-5:jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-10T19:30:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "4AS-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "4AS-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "4ES-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "4ES-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src", "5Server-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "5Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEAP-5:jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0210" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "4AS-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "4AS-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "4AS-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "4AS-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "4ES-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "4ES-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "4ES-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.noarch", "4ES-JBEAP:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el4.src", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.2.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.noarch", "5Server-JBEAP-4.3.0:jbossweb-0:2.0.0-8.CP15.patch01.0jpp.ep1.1.el5.src", "5Server-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEAP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "5Server-JBEAP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEAP-5:jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEAP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011:0214
Vulnerability from csaf_redhat
Published
2011-02-11 00:44
Modified
2025-08-01 19:30
Summary
Red Hat Security Advisory: java-1.6.0-openjdk security update
Notes
Topic
Updated java-1.6.0-openjdk packages that fix one security issue are now
available for Red Hat Enterprise Linux 5 and 6.
The Red Hat Security Response Team has rated this update as having moderate
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
These packages provide the OpenJDK 6 Java Runtime Environment and the
OpenJDK 6 Software Development Kit.
A denial of service flaw was found in the way certain strings were
converted to Double objects. A remote attacker could use this flaw to cause
Java-based applications to hang, for instance if they parse Double values
in a specially-crafted HTTP request. (CVE-2010-4476)
All users of java-1.6.0-openjdk are advised to upgrade to these updated
packages, which resolve this issue. All running instances of OpenJDK Java
must be restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-openjdk packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "These packages provide the OpenJDK 6 Java Runtime Environment and the\nOpenJDK 6 Software Development Kit.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nJava-based applications to hang, for instance if they parse Double values\nin a specially-crafted HTTP request. (CVE-2010-4476)\n\nAll users of java-1.6.0-openjdk are advised to upgrade to these updated\npackages, which resolve this issue. All running instances of OpenJDK Java\nmust be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0214", "url": "https://access.redhat.com/errata/RHSA-2011:0214" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0214.json" } ], "title": "Red Hat Security Advisory: java-1.6.0-openjdk security update", "tracking": { "current_release_date": "2025-08-01T19:30:07+00:00", "generator": { "date": "2025-08-01T19:30:07+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2011:0214", "initial_release_date": "2011-02-11T00:44:00+00:00", "revision_history": [ { "date": "2011-02-11T00:44:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-02-10T19:48:10+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-01T19:30:07+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product": { "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.x86_64", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.x86_64", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.18.b17.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.x86_64", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.x86_64", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.18.b17.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.x86_64", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.x86_64", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.18.b17.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.x86_64", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.x86_64", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.18.b17.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.x86_64", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.x86_64", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.18.b17.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.x86_64", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.x86_64", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.18.b17.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.36.b17.el6_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.36.b17.el6_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.36.b17.el6_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.36.b17.el6_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.36.b17.el6_0?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.36.b17.el6_0?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.i386", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.i386", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.18.b17.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.i386", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.i386", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.18.b17.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.i386", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.i386", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.18.b17.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.i386", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.i386", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.18.b17.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.i386", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.i386", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.18.b17.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.i386", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.i386", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.18.b17.el5?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.src", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.src", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.18.b17.el5?arch=src\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.36.b17.el6_0?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "product": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "product_id": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-src@1.6.0.0-1.36.b17.el6_0?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "product": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "product_id": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-demo@1.6.0.0-1.36.b17.el6_0?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "product": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "product_id": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-debuginfo@1.6.0.0-1.36.b17.el6_0?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "product": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "product_id": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-javadoc@1.6.0.0-1.36.b17.el6_0?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "product": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "product_id": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk-devel@1.6.0.0-1.36.b17.el6_0?arch=i686\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "product": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "product_id": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-openjdk@1.6.0.0-1.36.b17.el6_0?arch=i686\u0026epoch=1" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.i386" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.src", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.i386" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.i386" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.i386" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.i386" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.i386" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64" }, "product_reference": "java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.src", "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.x86_64", "6Client-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Client-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Client:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6ComputeNode-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6ComputeNode:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Server-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Server:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Workstation-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Workstation:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-11T00:44:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.src", "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.x86_64", "6Client-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Client-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Client:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6ComputeNode-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6ComputeNode:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Server-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Server:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Workstation-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Workstation:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0214" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.src", "5Server-5.6.Z:java-1.6.0-openjdk-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-demo-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-devel-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.18.b17.el5.x86_64", "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.i386", "5Server-5.6.Z:java-1.6.0-openjdk-src-1:1.6.0.0-1.18.b17.el5.x86_64", "6Client-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Client-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Client:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Client:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6ComputeNode-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6ComputeNode:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6ComputeNode:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6ComputeNode:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Server-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Server:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Server:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Workstation-optional:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation-optional:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.src", "6Workstation:java-1.6.0-openjdk-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-debuginfo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-demo-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-devel-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-javadoc-1:1.6.0.0-1.36.b17.el6_0.x86_64", "6Workstation:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.i686", "6Workstation:java-1.6.0-openjdk-src-1:1.6.0.0-1.36.b17.el6_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011:0212
Vulnerability from csaf_redhat
Published
2011-02-10 19:41
Modified
2025-08-01 19:32
Summary
Red Hat Security Advisory: jbossweb security update
Notes
Topic
A patch for JBoss Enterprise Application Platform 4.2.0.CP09, 4.3.0.CP09,
and 5.1 that fixes one security issue is now available from the Red Hat
Customer Portal.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
JBoss Web Server is the web container, based on Apache Tomcat, in JBoss
Enterprise Application Platform. It provides a single deployment platform
for the JavaServer Pages (JSP) and Java Servlet technologies.
A denial of service flaw was found in the way certain strings were
converted to Double objects. A remote attacker could use this flaw to cause
JBoss Web Server to hang via a specially-crafted HTTP request.
(CVE-2010-4476)
All users of Enterprise Application Platform 4.2, 4.3, and 5.1 as provided
from the Red Hat Customer Portal are advised to apply this patch. Refer to
the Solution section of this erratum for patch download instructions. The
JBoss server process must be restarted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "A patch for JBoss Enterprise Application Platform 4.2.0.CP09, 4.3.0.CP09,\nand 5.1 that fixes one security issue is now available from the Red Hat\nCustomer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "JBoss Web Server is the web container, based on Apache Tomcat, in JBoss\nEnterprise Application Platform. It provides a single deployment platform\nfor the JavaServer Pages (JSP) and Java Servlet technologies.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nJBoss Web Server to hang via a specially-crafted HTTP request.\n(CVE-2010-4476)\n\nAll users of Enterprise Application Platform 4.2, 4.3, and 5.1 as provided\nfrom the Red Hat Customer Portal are advised to apply this patch. Refer to\nthe Solution section of this erratum for patch download instructions. The\nJBoss server process must be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0212", "url": "https://access.redhat.com/errata/RHSA-2011:0212" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0212.json" } ], "title": "Red Hat Security Advisory: jbossweb security update", "tracking": { "current_release_date": "2025-08-01T19:32:33+00:00", "generator": { "date": "2025-08-01T19:32:33+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2011:0212", "initial_release_date": "2011-02-10T19:41:00+00:00", "revision_history": [ { "date": "2011-02-10T19:41:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:41:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-01T19:32:33+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.2", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.2", "product_id": "Red Hat JBoss Enterprise Application Platform 4.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.2" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.3", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.3", "product_id": "Red Hat JBoss Enterprise Application Platform 4.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 5.1", "product": { "name": "Red Hat JBoss Enterprise Application Platform 5.1", "product_id": "Red Hat JBoss Enterprise Application Platform 5.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5.1" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 4.2", "Red Hat JBoss Enterprise Application Platform 4.3", "Red Hat JBoss Enterprise Application Platform 5.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-10T19:41:00+00:00", "details": "A patch to correct CVE-2010-4476 for JBoss Enterprise Application Platform\n4.2.0.CP09, 4.3.0.CP09, and 5.1 is available from the Red Hat Customer\nPortal. To download this patch:\n\n1) Backup your existing JBoss Enterprise Application Platform installation\n(including all applications and configuration files).\n\n2) Log into the Customer Portal: https://access.redhat.com/login\n\n3) Navigate to\nhttps://access.redhat.com/jbossnetwork/restricted/listSoftware.html\n\n4) On the left-hand side menu, under \"JBoss Enterprise Platforms\" click\n\"Application Platform\". Then, use the \"Version:\" drop down menu to select\n\"4.2.0.GA_CP09\", \"4.3.0.GA_CP09\", or \"5.1.0\".\n\n5) The patch is available from the \"Security Advisories\" link. After\napplying the patch, the JBoss server process must be restarted for the\nupdate to take effect.", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 4.2", "Red Hat JBoss Enterprise Application Platform 4.3", "Red Hat JBoss Enterprise Application Platform 5.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0212" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 4.2", "Red Hat JBoss Enterprise Application Platform 4.3", "Red Hat JBoss Enterprise Application Platform 5.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011:0880
Vulnerability from csaf_redhat
Published
2011-06-16 19:13
Modified
2025-08-04 11:45
Summary
Red Hat Security Advisory: Red Hat Network Satellite server IBM Java Runtime security update
Notes
Topic
Updated java-1.6.0-ibm packages that fix several security issues are now
available for Red Hat Network Satellite 5.4.1 for Red Hat
Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having low
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.
Details
This update corrects several security vulnerabilities in the IBM Java
Runtime Environment shipped as part of Red Hat Network Satellite 5.4.1. In
a typical operating environment, these are of low security risk as the
runtime is not used on untrusted applets.
This update fixes several vulnerabilities in the IBM Java 2 Runtime
Environment. Detailed vulnerability descriptions are linked from the IBM
"Security alerts" page, listed in the References section. (CVE-2009-3555,
CVE-2010-1321, CVE-2010-3541, CVE-2010-3548, CVE-2010-3549, CVE-2010-3550,
CVE-2010-3551, CVE-2010-3553, CVE-2010-3555, CVE-2010-3556, CVE-2010-3557,
CVE-2010-3558, CVE-2010-3560, CVE-2010-3562, CVE-2010-3563, CVE-2010-3565,
CVE-2010-3566, CVE-2010-3568, CVE-2010-3569, CVE-2010-3571, CVE-2010-3572,
CVE-2010-3573, CVE-2010-3574, CVE-2010-4422, CVE-2010-4447, CVE-2010-4448,
CVE-2010-4452, CVE-2010-4454, CVE-2010-4462, CVE-2010-4463, CVE-2010-4465,
CVE-2010-4466, CVE-2010-4467, CVE-2010-4468, CVE-2010-4471, CVE-2010-4473,
CVE-2010-4475, CVE-2010-4476)
Users of Red Hat Network Satellite 5.4.1 are advised to upgrade to these
updated java-1.6.0-ibm packages, which contain the IBM 1.6.0 SR9-FP1 Java
release. For this update to take effect, Red Hat Network Satellite must be
restarted. Refer to the Solution section for details.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Low" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.6.0-ibm packages that fix several security issues are now\navailable for Red Hat Network Satellite 5.4.1 for Red Hat\nEnterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having low\nsecurity impact. Common Vulnerability Scoring System (CVSS) base scores,\nwhich give detailed severity ratings, are available for each vulnerability\nfrom the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "This update corrects several security vulnerabilities in the IBM Java\nRuntime Environment shipped as part of Red Hat Network Satellite 5.4.1. In\na typical operating environment, these are of low security risk as the\nruntime is not used on untrusted applets.\n\nThis update fixes several vulnerabilities in the IBM Java 2 Runtime\nEnvironment. Detailed vulnerability descriptions are linked from the IBM\n\"Security alerts\" page, listed in the References section. (CVE-2009-3555,\nCVE-2010-1321, CVE-2010-3541, CVE-2010-3548, CVE-2010-3549, CVE-2010-3550,\nCVE-2010-3551, CVE-2010-3553, CVE-2010-3555, CVE-2010-3556, CVE-2010-3557,\nCVE-2010-3558, CVE-2010-3560, CVE-2010-3562, CVE-2010-3563, CVE-2010-3565,\nCVE-2010-3566, CVE-2010-3568, CVE-2010-3569, CVE-2010-3571, CVE-2010-3572,\nCVE-2010-3573, CVE-2010-3574, CVE-2010-4422, CVE-2010-4447, CVE-2010-4448,\nCVE-2010-4452, CVE-2010-4454, CVE-2010-4462, CVE-2010-4463, CVE-2010-4465,\nCVE-2010-4466, CVE-2010-4467, CVE-2010-4468, CVE-2010-4471, CVE-2010-4473,\nCVE-2010-4475, CVE-2010-4476)\n\nUsers of Red Hat Network Satellite 5.4.1 are advised to upgrade to these\nupdated java-1.6.0-ibm packages, which contain the IBM 1.6.0 SR9-FP1 Java\nrelease. For this update to take effect, Red Hat Network Satellite must be\nrestarted. Refer to the Solution section for details.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0880", "url": "https://access.redhat.com/errata/RHSA-2011:0880" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#low", "url": "https://access.redhat.com/security/updates/classification/#low" }, { "category": "external", "summary": "http://www.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "533125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125" }, { "category": "external", "summary": "582466", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=582466" }, { "category": "external", "summary": "639876", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639876" }, { "category": "external", "summary": "639897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639897" }, { "category": "external", "summary": "639904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639904" }, { "category": "external", "summary": "639909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639909" }, { "category": "external", "summary": "639920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639920" }, { "category": "external", "summary": "639922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639922" }, { "category": "external", "summary": "639925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639925" }, { "category": "external", "summary": "642167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642167" }, { "category": "external", "summary": "642180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642180" }, { "category": "external", "summary": "642187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642187" }, { "category": "external", "summary": "642202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642202" }, { "category": "external", "summary": "642215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642215" }, { "category": "external", "summary": "642558", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642558" }, { "category": "external", "summary": "642559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642559" }, { "category": "external", "summary": "642573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642573" }, { "category": "external", "summary": "642576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642576" }, { "category": "external", "summary": "642585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642585" }, { "category": "external", "summary": "642589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642589" }, { "category": "external", "summary": "642593", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642593" }, { "category": "external", "summary": "642611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642611" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "675984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675984" }, { "category": "external", "summary": "676019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676019" }, { "category": "external", "summary": "676023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676023" }, { "category": "external", "summary": "677957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677957" }, { "category": "external", "summary": "677958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677958" }, { "category": "external", "summary": "677959", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677959" }, { "category": "external", "summary": "677960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677960" }, { "category": "external", "summary": "677961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677961" }, { "category": "external", "summary": "677963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677963" }, { "category": "external", "summary": "677966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677966" }, { "category": "external", "summary": "677967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677967" }, { "category": "external", "summary": "677968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677968" }, { "category": "external", "summary": "677970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677970" }, { "category": "external", "summary": "677971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677971" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0880.json" } ], "title": "Red Hat Security Advisory: Red Hat Network Satellite server IBM Java Runtime security update", "tracking": { "current_release_date": "2025-08-04T11:45:05+00:00", "generator": { "date": "2025-08-04T11:45:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2011:0880", "initial_release_date": "2011-06-16T19:13:00+00:00", "revision_history": [ { "date": "2011-06-16T19:13:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-06-16T15:21:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-04T11:45:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Satellite 5.4 (RHEL v.5)", "product": { "name": "Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54", "product_identification_helper": { "cpe": "cpe:/a:redhat:network_satellite:5.4::el5" } } } ], "category": "product_family", "name": "Red Hat Satellite" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "product_id": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.1-1jpp.1.el5?arch=src\u0026epoch=1" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "product_id": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.1-1jpp.1.el5?arch=s390x\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.1-1jpp.1.el5?arch=s390x\u0026epoch=1" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.1-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.1-1jpp.1.el5?arch=x86_64\u0026epoch=1" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "product": { "name": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "product_id": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm@1.6.0.9.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } }, { "category": "product_version", "name": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "product": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "product_id": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.6.0-ibm-devel@1.6.0.9.1-1jpp.1.el5?arch=i386\u0026epoch=1" } } } ], "category": "architecture", "name": "i386" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386 as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386 as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "relates_to_product_reference": "5Server-Satellite54" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64 as a component of Red Hat Satellite 5.4 (RHEL v.5)", "product_id": "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" }, "product_reference": "java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64", "relates_to_product_reference": "5Server-Satellite54" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-3555", "cwe": { "id": "CWE-300", "name": "Channel Accessible by Non-Endpoint" }, "discovery_date": "2009-10-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "533125" } ], "notes": [ { "category": "description", "text": "The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS) 3.12.4 and earlier, multiple Cisco products, and other products, does not properly associate renegotiation handshakes with an existing connection, which allows man-in-the-middle attackers to insert data into HTTPS sessions, and possibly other types of sessions protected by TLS or SSL, by sending an unauthenticated request that is processed retroactively by a server in a post-renegotiation context, related to a \"plaintext injection\" attack, aka the \"Project Mogul\" issue.", "title": "Vulnerability description" }, { "category": "summary", "text": "TLS: MITM attacks via session renegotiation", "title": "Vulnerability summary" }, { "category": "other", "text": "Additional information can be found in the Red Hat Knowledgebase article:\nhttps://access.redhat.com/articles/20490", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3555" }, { "category": "external", "summary": "RHBZ#533125", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=533125" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3555", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3555" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3555" } ], "release_date": "2009-11-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "TLS: MITM attacks via session renegotiation" }, { "acknowledgments": [ { "names": [ "MIT Kerberos Team" ] }, { "names": [ "Shawn Emery" ], "organization": "Oracle", "summary": "Acknowledged by upstream." } ], "cve": "CVE-2010-1321", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2010-04-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "582466" } ], "notes": [ { "category": "description", "text": "The kg_accept_krb5 function in krb5/accept_sec_context.c in the GSS-API library in MIT Kerberos 5 (aka krb5) through 1.7.1 and 1.8 before 1.8.2, as used in kadmind and other applications, does not properly check for invalid GSS-API tokens, which allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via an AP-REQ message in which the authenticator\u0027s checksum field is missing.", "title": "Vulnerability description" }, { "category": "summary", "text": "krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1321" }, { "category": "external", "summary": "RHBZ#582466", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=582466" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1321", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1321" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1321", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1321" } ], "release_date": "2010-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "krb5: null pointer dereference in GSS-API library leads to DoS (MITKRB5-SA-2010-005)" }, { "cve": "CVE-2010-3541", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642202" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is related to missing validation of request headers in the HttpURLConnection class when they are set by applets, which allows remote attackers to bypass the intended security policy.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3541" }, { "category": "external", "summary": "RHBZ#642202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3541", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3541" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3541", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3541" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004)" }, { "cve": "CVE-2010-3548", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639909" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Naming and Directory Interface (JNDI) component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this allows remote attackers to determine internal IP addresses or \"otherwise-protected internal network names.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK DNS server IP address information leak (6957564)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3548" }, { "category": "external", "summary": "RHBZ#639909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639909" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3548", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3548" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3548", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3548" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK DNS server IP address information leak (6957564)" }, { "cve": "CVE-2010-3549", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642180" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is an HTTP request splitting vulnerability involving the handling of the chunked transfer encoding method by the HttpURLConnection class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK HttpURLConnection request splitting (6952017)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3549" }, { "category": "external", "summary": "RHBZ#642180", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642180" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3549", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3549" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3549", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3549" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK HttpURLConnection request splitting (6952017)" }, { "cve": "CVE-2010-3550", "discovery_date": "2010-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642559" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Web Start component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Java Web Start component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3550" }, { "category": "external", "summary": "RHBZ#642559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642559" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3550", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3550" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3550", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3550" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Java Web Start component" }, { "cve": "CVE-2010-3551", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642187" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK local network address disclosure (6952603)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3551" }, { "category": "external", "summary": "RHBZ#642187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642187" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3551", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3551" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK local network address disclosure (6952603)" }, { "cve": "CVE-2010-3553", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642167" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is related to unsafe reflection involving the UIDefault.ProxyLazyValue class.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Swing unsafe reflection usage (6622002)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3553" }, { "category": "external", "summary": "RHBZ#642167", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642167" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3553", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3553" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3553", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3553" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Swing unsafe reflection usage (6622002)" }, { "cve": "CVE-2010-3555", "discovery_date": "2010-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642558" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Deployment component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the January 2011 CPU. Oracle has not commented on claims from a reliable third party coordinator that the ActiveX Plugin does not properly initialize an object field that is used as a window handle, which allows attackers to execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3555" }, { "category": "external", "summary": "RHBZ#642558", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642558" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3555", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3555" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3555", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3555" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-3556", "discovery_date": "2010-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642576" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in 2D component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3556" }, { "category": "external", "summary": "RHBZ#642576", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642576" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3556", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3556" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3556", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3556" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK unspecified vulnerability in 2D component" }, { "cve": "CVE-2010-3557", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639904" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Swing component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is related to the modification of \"behavior and state of certain JDK classes\" and \"mutable static.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Swing mutable static (6938813)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3557" }, { "category": "external", "summary": "RHBZ#639904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3557", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3557" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3557", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3557" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Swing mutable static (6938813)" }, { "cve": "CVE-2010-3558", "discovery_date": "2010-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642593" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Web Start component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Java Web Start component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3558" }, { "category": "external", "summary": "RHBZ#642593", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642593" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3558", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3558" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK unspecified vulnerability in Java Web Start component" }, { "cve": "CVE-2010-3560", "discovery_date": "2010-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642573" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Networking component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3560" }, { "category": "external", "summary": "RHBZ#642573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642573" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3560", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3560" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3560", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3560" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "JDK unspecified vulnerability in Networking component" }, { "cve": "CVE-2010-3562", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639897" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is a double free vulnerability in IndexColorModel that allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK IndexColorModel double-free (6925710)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3562" }, { "category": "external", "summary": "RHBZ#639897", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639897" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3562", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3562" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3562", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3562" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK IndexColorModel double-free (6925710)" }, { "cve": "CVE-2010-3563", "discovery_date": "2010-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642589" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Deployment component in Oracle Java SE and Java for Business 6 Update 21 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is related to \"how Web Start retrieves security policies,\" BasicServiceImpl, and forged policies that bypass sandbox restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK: unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3563" }, { "category": "external", "summary": "RHBZ#642589", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642589" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3563", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3563" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3563", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3563" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "OpenJDK: unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-3565", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639920" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow that triggers memory corruption via large values in a subsample of a JPEG image, related to JPEGImageWriter.writeImage in the imageio API.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK JPEG writeImage remote code execution (6963023)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3565" }, { "category": "external", "summary": "RHBZ#639920", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639920" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3565", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3565" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK JPEG writeImage remote code execution (6963023)" }, { "cve": "CVE-2010-3566", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639922" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update and 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow that leads to a buffer overflow via a crafted devs (device information) tag structure in a color profile.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK ICC Profile remote code execution (6963489)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3566" }, { "category": "external", "summary": "RHBZ#639922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639922" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3566", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3566" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3566", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3566" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK ICC Profile remote code execution (6963489)" }, { "cve": "CVE-2010-3568", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639876" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is a race condition related to deserialization.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Deserialization Race condition (6559775)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3568" }, { "category": "external", "summary": "RHBZ#639876", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639876" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3568", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3568" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3568", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3568" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Deserialization Race condition (6559775)" }, { "cve": "CVE-2010-3569", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639925" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this allows remote attackers to execute arbitrary code by causing the defaultReadObject method in the Serialization API to set a volatile field multiple times.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Serialization inconsistencies (6966692)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3569" }, { "category": "external", "summary": "RHBZ#639925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639925" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3569", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3569" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3569", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3569" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Serialization inconsistencies (6966692)" }, { "cve": "CVE-2010-3571", "discovery_date": "2010-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642585" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the 2D component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable researcher that this is an integer overflow in the color profile parser that allows remote attackers to execute arbitrary code via a crafted Tag structure in a color profile.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in 2D component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3571" }, { "category": "external", "summary": "RHBZ#642585", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642585" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3571", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3571" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3571", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3571" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK unspecified vulnerability in 2D component" }, { "cve": "CVE-2010-3572", "discovery_date": "2010-10-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642611" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Sound component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Sound component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3572" }, { "category": "external", "summary": "RHBZ#642611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642611" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3572", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3572" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3572", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3572" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "JDK unspecified vulnerability in Sound component" }, { "cve": "CVE-2010-3573", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642202" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21 and 5.0 Update 25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that this is related to missing validation of request headers in the HttpURLConnection class when they are set by applets, which allows remote attackers to bypass the intended security policy.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3573" }, { "category": "external", "summary": "RHBZ#642202", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642202" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3573", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3573" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004)" }, { "cve": "CVE-2010-3574", "discovery_date": "2010-09-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642215" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Networking component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, 1.4.2_27, and 1.3.1_28 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. NOTE: the previous information was obtained from the October 2010 CPU. Oracle has not commented on claims from a reliable downstream vendor that HttpURLConnection does not properly check for the allowHttpTrace permission, which allows untrusted code to perform HTTP TRACE requests.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK HttpURLConnection incomplete TRACE permission check (6981426)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3574" }, { "category": "external", "summary": "RHBZ#642215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642215" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3574", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3574" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3574", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3574" } ], "release_date": "2010-10-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK HttpURLConnection incomplete TRACE permission check (6981426)" }, { "cve": "CVE-2010-4422", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677971" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4422" }, { "category": "external", "summary": "RHBZ#677971", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677971" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4422", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4422" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4422", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4422" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4447", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677970" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Deployment, a different vulnerability than CVE-2010-4475.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4447" }, { "category": "external", "summary": "RHBZ#677970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4447", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4447" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4447", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4447" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4448", "discovery_date": "2011-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "676023" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect integrity via unknown vectors related to Networking. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue involves \"DNS cache poisoning by untrusted applets.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK DNS cache poisoning by untrusted applets (6981922)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4448" }, { "category": "external", "summary": "RHBZ#676023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4448", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4448" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4448", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4448" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "OpenJDK DNS cache poisoning by untrusted applets (6981922)" }, { "cve": "CVE-2010-4452", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677968" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Deployment component in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4452" }, { "category": "external", "summary": "RHBZ#677968", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677968" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4452", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4452" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4452", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4452" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4454", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677967" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs, a different vulnerability than CVE-2010-4462 and CVE-2010-4473.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Sound component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4454" }, { "category": "external", "summary": "RHBZ#677967", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677967" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4454", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4454" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4454", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4454" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Sound component" }, { "cve": "CVE-2010-4462", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677966" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs, a different vulnerability than CVE-2010-4454 and CVE-2010-4473.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Sound component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4462" }, { "category": "external", "summary": "RHBZ#677966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677966" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4462", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4462" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4462", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4462" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Sound component" }, { "cve": "CVE-2010-4463", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677963" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 21 through 6 Update 23 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4463" }, { "category": "external", "summary": "RHBZ#677963", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677963" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4463", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4463" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4463", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4463" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4465", "discovery_date": "2011-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "675984" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Swing. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue is related to the lack of framework support by AWT event dispatch, and/or \"clipboard access in Applets.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Swing timer-based security manager bypass (6907662)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4465" }, { "category": "external", "summary": "RHBZ#675984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675984" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4465", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4465" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4465", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4465" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "OpenJDK Swing timer-based security manager bypass (6907662)" }, { "cve": "CVE-2010-4466", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677961" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier for Windows, Solaris, and, Linux; 5.0 Update 27 and earlier for Windows; and 1.4.2_29 and earlier for Windows allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4466" }, { "category": "external", "summary": "RHBZ#677961", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677961" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4466", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4466" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4466", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4466" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4467", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677960" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 10 through 6 Update 23 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deployment.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4467" }, { "category": "external", "summary": "RHBZ#677960", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677960" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4467", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4467" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4467", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4467" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4468", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677959" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, and 5.0 Update 27 and earlier, allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity via unknown vectors related to JDBC.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in JDBC component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4468" }, { "category": "external", "summary": "RHBZ#677959", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677959" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4468", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4468" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4468", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4468" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK unspecified vulnerability in JDBC component" }, { "cve": "CVE-2010-4471", "discovery_date": "2010-07-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "676019" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, and 5.0 Update 27 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to 2D. NOTE: the previous information was obtained from the February 2011 CPU. Oracle has not commented on claims from a downstream vendor that this issue is related to the exposure of system properties via vectors related to Font.createFont and exception text.", "title": "Vulnerability description" }, { "category": "summary", "text": "OpenJDK Java2D font-related system property leak (6985453)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4471" }, { "category": "external", "summary": "RHBZ#676019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4471", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4471" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4471", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4471" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "OpenJDK Java2D font-related system property leak (6985453)" }, { "cve": "CVE-2010-4473", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677958" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Sound and unspecified APIs, a different vulnerability than CVE-2010-4454 and CVE-2010-4462.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Sound component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4473" }, { "category": "external", "summary": "RHBZ#677958", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677958" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4473", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4473" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4473", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4473" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "JDK unspecified vulnerability in Sound component" }, { "cve": "CVE-2010-4475", "discovery_date": "2011-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677957" } ], "notes": [ { "category": "description", "text": "Unspecified vulnerability in the Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Deployment, a different vulnerability than CVE-2010-4447.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK unspecified vulnerability in Deployment component", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4475" }, { "category": "external", "summary": "RHBZ#677957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677957" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4475", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4475" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4475", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4475" } ], "release_date": "2011-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK unspecified vulnerability in Deployment component" }, { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-06-16T19:13:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nRun the following command to restart the Red Hat Network Satellite\nserver:\n\n# rhn-satellite restart", "product_ids": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0880" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.src", "5Server-Satellite54:java-1.6.0-ibm-1:1.6.0.9.1-1jpp.1.el5.x86_64", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.i386", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.s390x", "5Server-Satellite54:java-1.6.0-ibm-devel-1:1.6.0.9.1-1jpp.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011:0213
Vulnerability from csaf_redhat
Published
2011-02-10 19:42
Modified
2025-08-01 19:30
Summary
Red Hat Security Advisory: jbossweb security update
Notes
Topic
Updated jbossweb packages that fix one security issue are now available for
JBoss Enterprise Web Platform 5 from the Red Hat Customer Portal.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
JBoss Web Server is a web container based on Apache Tomcat. It provides a
single deployment platform for the JavaServer Pages (JSP) and Java Servlet
technologies.
A denial of service flaw was found in the way certain strings were
converted to Double objects. A remote attacker could use this flaw to cause
JBoss Web Server to hang via a specially-crafted HTTP request.
(CVE-2010-4476)
All users of JBoss Enterprise Web Platform 5 as provided from the Red Hat
Customer Portal are advised to apply this patch. Refer to the Solution
section of this erratum for patch download instructions. The JBoss server
process must be restarted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated jbossweb packages that fix one security issue are now available for\nJBoss Enterprise Web Platform 5 from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "JBoss Web Server is a web container based on Apache Tomcat. It provides a\nsingle deployment platform for the JavaServer Pages (JSP) and Java Servlet\ntechnologies.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nJBoss Web Server to hang via a specially-crafted HTTP request.\n(CVE-2010-4476)\n\nAll users of JBoss Enterprise Web Platform 5 as provided from the Red Hat\nCustomer Portal are advised to apply this patch. Refer to the Solution\nsection of this erratum for patch download instructions. The JBoss server\nprocess must be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0213", "url": "https://access.redhat.com/errata/RHSA-2011:0213" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0213.json" } ], "title": "Red Hat Security Advisory: jbossweb security update", "tracking": { "current_release_date": "2025-08-01T19:30:02+00:00", "generator": { "date": "2025-08-01T19:30:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2011:0213", "initial_release_date": "2011-02-10T19:42:00+00:00", "revision_history": [ { "date": "2011-02-10T19:42:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-02-10T14:46:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-01T19:30:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Platform 5.1", "product": { "name": "Red Hat JBoss Web Platform 5.1", "product_id": "Red Hat JBoss Web Platform 5.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_platform:5.1" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Platform 5.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-10T19:42:00+00:00", "details": "A patch to correct CVE-2010-4476 for JBoss Enterprise Web Platform 5.1 is\navailable from the Red Hat Customer Portal. To download this patch:\n\n1) Backup your existing JBoss Enterprise Web Platform installation\n(including all applications and configuration files).\n\n2) Log into the Customer Portal: https://access.redhat.com/login\n\n3) Navigate to\nhttps://access.redhat.com/jbossnetwork/restricted/listSoftware.html\n\n4) On the left-hand side menu, under \"JBoss Enterprise Platforms\" click\n\"Enterprise Web Platform\". Then, use the \"Version:\" drop down menu to\nselect \"5.1.0\".\n\n5) The patch is available from the \"Security Advisories\" link. After\napplying the patch, the JBoss server process must be restarted for the\nupdate to take effect.", "product_ids": [ "Red Hat JBoss Web Platform 5.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0213" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Platform 5.1" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011:0336
Vulnerability from csaf_redhat
Published
2011-03-09 21:07
Modified
2025-08-01 19:30
Summary
Red Hat Security Advisory: tomcat5 security update
Notes
Topic
Updated tomcat5 packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
Apache Tomcat is a servlet container for the Java Servlet and JavaServer
Pages (JSP) technologies.
A denial of service flaw was found in the way certain strings were
converted to Double objects. A remote attacker could use this flaw to cause
Tomcat to hang via a specially-crafted HTTP request. (CVE-2010-4476)
Users of Tomcat should upgrade to these updated packages, which contain a
backported patch to correct this issue. Tomcat must be restarted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated tomcat5 packages that fix one security issue are now available for\nRed Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nTomcat to hang via a specially-crafted HTTP request. (CVE-2010-4476)\n\nUsers of Tomcat should upgrade to these updated packages, which contain a\nbackported patch to correct this issue. Tomcat must be restarted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0336", "url": "https://access.redhat.com/errata/RHSA-2011:0336" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://tomcat.apache.org/security-5.html", "url": "http://tomcat.apache.org/security-5.html" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0336.json" } ], "title": "Red Hat Security Advisory: tomcat5 security update", "tracking": { "current_release_date": "2025-08-01T19:30:58+00:00", "generator": { "date": "2025-08-01T19:30:58+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2011:0336", "initial_release_date": "2011-03-09T21:07:00+00:00", "revision_history": [ { "date": "2011-03-09T21:07:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-03-09T16:07:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-01T19:30:58+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product": { "name": "Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ia64", "product": { "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ia64", "product_id": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.17.el5_6?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.ia64", "product": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.ia64", "product_id": "tomcat5-0:5.5.23-0jpp.17.el5_6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.17.el5_6?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ia64", "product": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ia64", "product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.17.el5_6?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ia64", "product": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ia64", "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.17.el5_6?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "product": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.17.el5_6?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ia64", "product": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ia64", "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.17.el5_6?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "product": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.17.el5_6?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ia64", "product": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ia64", "product_id": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.17.el5_6?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "product": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.17.el5_6?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "product": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.17.el5_6?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "product": { "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "product_id": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.17.el5_6?arch=ia64" } } }, { "category": "product_version", "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ia64", "product": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ia64", "product_id": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.17.el5_6?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ppc", "product": { "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ppc", "product_id": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.17.el5_6?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.ppc", "product": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.ppc", "product_id": "tomcat5-0:5.5.23-0jpp.17.el5_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.17.el5_6?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc", "product": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc", "product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.17.el5_6?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ppc", "product": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ppc", "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.17.el5_6?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "product": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.17.el5_6?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ppc", "product": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ppc", "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.17.el5_6?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "product": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.17.el5_6?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ppc", "product": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ppc", "product_id": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.17.el5_6?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "product": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.17.el5_6?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "product": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.17.el5_6?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "product": { "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "product_id": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.17.el5_6?arch=ppc" } } }, { "category": "product_version", "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ppc", "product": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ppc", "product_id": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.17.el5_6?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.ppc64", "product": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.ppc64", "product_id": "tomcat5-0:5.5.23-0jpp.17.el5_6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.17.el5_6?arch=ppc64" } } }, { "category": "product_version", "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc64", "product": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc64", "product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.17.el5_6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.s390x", "product": { "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.s390x", "product_id": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.17.el5_6?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.s390x", "product": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.s390x", "product_id": "tomcat5-0:5.5.23-0jpp.17.el5_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.17.el5_6?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.s390x", "product": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.s390x", "product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.17.el5_6?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.s390x", "product": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.s390x", "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.17.el5_6?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "product": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.17.el5_6?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.s390x", "product": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.s390x", "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.17.el5_6?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "product": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.17.el5_6?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.s390x", "product": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.s390x", "product_id": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.17.el5_6?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "product": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.17.el5_6?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "product": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.17.el5_6?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "product": { "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "product_id": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.17.el5_6?arch=s390x" } } }, { "category": "product_version", "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.s390x", "product": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.s390x", "product_id": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.17.el5_6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.x86_64", "product": { "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.x86_64", "product_id": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.17.el5_6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.x86_64", "product": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.x86_64", "product_id": "tomcat5-0:5.5.23-0jpp.17.el5_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.17.el5_6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.x86_64", "product": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.x86_64", "product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.17.el5_6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.x86_64", "product": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.x86_64", "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.17.el5_6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "product": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.17.el5_6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.x86_64", "product": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.x86_64", "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.17.el5_6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "product": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.17.el5_6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "product": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "product_id": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.17.el5_6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.x86_64", "product": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.x86_64", "product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.17.el5_6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "product": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.17.el5_6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.x86_64", "product": { "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.x86_64", "product_id": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.17.el5_6?arch=x86_64" } } }, { "category": "product_version", "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "product": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "product_id": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.17.el5_6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.i386", "product": { "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.i386", "product_id": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper@5.5.23-0jpp.17.el5_6?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.i386", "product": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.i386", "product_id": "tomcat5-0:5.5.23-0jpp.17.el5_6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.17.el5_6?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.i386", "product": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.i386", "product_id": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-debuginfo@5.5.23-0jpp.17.el5_6?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.i386", "product": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.i386", "product_id": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api@5.5.23-0jpp.17.el5_6?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "product": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "product_id": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-servlet-2.4-api-javadoc@5.5.23-0jpp.17.el5_6?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.i386", "product": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.i386", "product_id": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api@5.5.23-0jpp.17.el5_6?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "product": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "product_id": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jsp-2.0-api-javadoc@5.5.23-0jpp.17.el5_6?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.i386", "product": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.i386", "product_id": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-server-lib@5.5.23-0jpp.17.el5_6?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.i386", "product": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.i386", "product_id": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-admin-webapps@5.5.23-0jpp.17.el5_6?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "product": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "product_id": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-jasper-javadoc@5.5.23-0jpp.17.el5_6?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.i386", "product": { "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.i386", "product_id": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-webapps@5.5.23-0jpp.17.el5_6?arch=i386" } } }, { "category": "product_version", "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.i386", "product": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.i386", "product_id": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5-common-lib@5.5.23-0jpp.17.el5_6?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.src", "product": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.src", "product_id": "tomcat5-0:5.5.23-0jpp.17.el5_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat5@5.5.23-0jpp.17.el5_6?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.i386" }, "product_reference": "tomcat5-0:5.5.23-0jpp.17.el5_6.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.ia64" }, "product_reference": "tomcat5-0:5.5.23-0jpp.17.el5_6.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.ppc" }, "product_reference": "tomcat5-0:5.5.23-0jpp.17.el5_6.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.ppc64" }, "product_reference": "tomcat5-0:5.5.23-0jpp.17.el5_6.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.s390x" }, "product_reference": "tomcat5-0:5.5.23-0jpp.17.el5_6.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.src" }, "product_reference": "tomcat5-0:5.5.23-0jpp.17.el5_6.src", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-0:5.5.23-0jpp.17.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.x86_64" }, "product_reference": "tomcat5-0:5.5.23-0jpp.17.el5_6.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.i386" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ia64" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ppc" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.s390x" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.x86_64" }, "product_reference": "tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.i386" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ia64" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ppc" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.s390x" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.x86_64" }, "product_reference": "tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.i386" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ia64" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc64" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.s390x" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.x86_64" }, "product_reference": "tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.i386" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ia64" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ppc" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.s390x" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.x86_64" }, "product_reference": "tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.i386" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ia64" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ppc" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.s390x" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64" }, "product_reference": "tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.i386" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ia64" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ppc" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.s390x" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.x86_64" }, "product_reference": "tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64" }, "product_reference": "tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.i386" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ia64" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ppc" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.s390x" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.x86_64" }, "product_reference": "tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.i386" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ia64" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ppc" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.s390x" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.x86_64" }, "product_reference": "tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64" }, "product_reference": "tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.i386" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.i386", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ia64" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ppc" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.s390x" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "relates_to_product_reference": "5Server-5.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)", "product_id": "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.x86_64" }, "product_reference": "tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.x86_64", "relates_to_product_reference": "5Server-5.6.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.ppc64", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.src", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc64", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-09T21:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.ppc64", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.src", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc64", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0336" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.ppc64", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.src", "5Server-5.6.Z:tomcat5-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-admin-webapps-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-common-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.ppc64", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-debuginfo-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-jasper-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-jasper-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-jsp-2.0-api-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-jsp-2.0-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-server-lib-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-servlet-2.4-api-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-servlet-2.4-api-javadoc-0:5.5.23-0jpp.17.el5_6.x86_64", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.i386", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ia64", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.ppc", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.s390x", "5Server-5.6.Z:tomcat5-webapps-0:5.5.23-0jpp.17.el5_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011:0292
Vulnerability from csaf_redhat
Published
2011-02-22 17:17
Modified
2025-08-01 19:30
Summary
Red Hat Security Advisory: java-1.4.2-ibm security update
Notes
Topic
Updated java-1.4.2-ibm packages that fix one security issue are now
available for Red Hat Enterprise Linux 4 Extras and Red Hat Enterprise
Linux 5 Supplementary.
The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.
Details
The IBM 1.4.2 SR13-FP8 Java release includes the IBM Java 2 Runtime
Environment and the IBM Java 2 Software Development Kit.
A denial of service flaw was found in the way certain strings were
converted to Double objects. A remote attacker could use this flaw to cause
Java based applications to hang, for example, if they parsed Double values
in a specially-crafted HTTP request. (CVE-2010-4476)
All users of java-1.4.2-ibm are advised to upgrade to these updated
packages, which contain the IBM 1.4.2 SR13-FP8 Java release. All running
instances of IBM Java must be restarted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated java-1.4.2-ibm packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 4 Extras and Red Hat Enterprise\nLinux 5 Supplementary.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.", "title": "Topic" }, { "category": "general", "text": "The IBM 1.4.2 SR13-FP8 Java release includes the IBM Java 2 Runtime\nEnvironment and the IBM Java 2 Software Development Kit.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nJava based applications to hang, for example, if they parsed Double values\nin a specially-crafted HTTP request. (CVE-2010-4476)\n\nAll users of java-1.4.2-ibm are advised to upgrade to these updated\npackages, which contain the IBM 1.4.2 SR13-FP8 Java release. All running\ninstances of IBM Java must be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0292", "url": "https://access.redhat.com/errata/RHSA-2011:0292" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "http://www.ibm.com/developerworks/java/jdk/alerts/", "url": "http://www.ibm.com/developerworks/java/jdk/alerts/" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0292.json" } ], "title": "Red Hat Security Advisory: java-1.4.2-ibm security update", "tracking": { "current_release_date": "2025-08-01T19:30:35+00:00", "generator": { "date": "2025-08-01T19:30:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2011:0292", "initial_release_date": "2011-02-22T17:17:00+00:00", "revision_history": [ { "date": "2011-02-22T17:17:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-02-22T12:22:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-01T19:30:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product": { "name": "Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:5::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Desktop version 4 Extras", "product": { "name": "Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4 Extras", "product": { "name": "Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4 Extras", "product": { "name": "Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_extras:4" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux Supplementary" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.3.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.8-1jpp.3.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.3.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.3.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.3.el5?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.4.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.4.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.4.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.4.el4?arch=x86_64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.8-1jpp.4.el4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.3.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.8-1jpp.3.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.3.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.3.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386", "product": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386", "product_id": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-plugin@1.4.2.13.8-1jpp.3.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.8-1jpp.3.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.3.el5?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.4.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "product": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "product_id": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-plugin@1.4.2.13.8-1jpp.4.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.4.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.4.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.4.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.8-1jpp.4.el4?arch=i386" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.8-1jpp.4.el4?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.3.el5?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.3.el5?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.3.el5?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.3.el5?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.4.el4?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.4.el4?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.4.el4?arch=ia64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.4.el4?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.3.el5?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.8-1jpp.3.el5?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.3.el5?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.3.el5?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.3.el5?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.4.el4?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.4.el4?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.4.el4?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.4.el4?arch=ppc64" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.8-1jpp.4.el4?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.3.el5?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.8-1jpp.3.el5?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.3.el5?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.3.el5?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.8-1jpp.3.el5?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.3.el5?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.4.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.4.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.4.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.4.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "product": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "product_id": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-javacomm@1.4.2.13.8-1jpp.4.el4?arch=ppc" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.8-1jpp.4.el4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.3.el5?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.3.el5?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.3.el5?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.3.el5?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.4.el4?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.4.el4?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.4.el4?arch=s390x" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.4.el4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.3.el5?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.3.el5?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.3.el5?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.8-1jpp.3.el5?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.3.el5?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "product": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "product_id": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm@1.4.2.13.8-1jpp.4.el4?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "product": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "product_id": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-src@1.4.2.13.8-1jpp.4.el4?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "product": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "product_id": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-devel@1.4.2.13.8-1jpp.4.el4?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "product": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "product_id": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-demo@1.4.2.13.8-1jpp.4.el4?arch=s390" } } }, { "category": "product_version", "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "product": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "product_id": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/java-1.4.2-ibm-jdbc@1.4.2.13.8-1jpp.4.el4?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4 Extras", "product_id": "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4AS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Desktop version 4 Extras", "product_id": "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4Desktop-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4 Extras", "product_id": "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4ES-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4 Extras", "product_id": "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "relates_to_product_reference": "4WS-LACD" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop Supplementary (v. 5)", "product_id": "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Client-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390" }, "product_reference": "java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x", "relates_to_product_reference": "5Server-Supplementary" }, { "category": "default_component_of", "full_product_name": { "name": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64 as a component of Red Hat Enterprise Linux Server Supplementary (v. 5)", "product_id": "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64" }, "product_reference": "java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64", "relates_to_product_reference": "5Server-Supplementary" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-22T17:17:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0292" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "4AS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "4Desktop-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "4ES-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.4.el4.x86_64", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.i386", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ia64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.ppc64", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.s390x", "4WS-LACD:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.4.el4.x86_64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Client-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-demo-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-devel-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-javacomm-0:1.4.2.13.8-1jpp.3.el5.x86_64", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-jdbc-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-plugin-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.i386", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ia64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.ppc64", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.s390x", "5Server-Supplementary:java-1.4.2-ibm-src-0:1.4.2.13.8-1jpp.3.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011:0211
Vulnerability from csaf_redhat
Published
2011-02-10 19:33
Modified
2025-08-01 19:32
Summary
Red Hat Security Advisory: jbossweb security update
Notes
Topic
Updated jbossweb packages that fix one security issue are now available for
JBoss Enterprise Web Platform 5 for Red Hat Enterprise Linux 4 and 5.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
JBoss Web Server is a web container based on Apache Tomcat. It provides a
single deployment platform for the JavaServer Pages (JSP) and Java Servlet
technologies.
A denial of service flaw was found in the way certain strings were
converted to Double objects. A remote attacker could use this flaw to cause
JBoss Web Server to hang via a specially-crafted HTTP request.
(CVE-2010-4476)
Users of JBoss Web Server should upgrade to these updated packages, which
contain a backported patch to correct this issue. The JBoss server process
must be restarted for this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated jbossweb packages that fix one security issue are now available for\nJBoss Enterprise Web Platform 5 for Red Hat Enterprise Linux 4 and 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "JBoss Web Server is a web container based on Apache Tomcat. It provides a\nsingle deployment platform for the JavaServer Pages (JSP) and Java Servlet\ntechnologies.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nJBoss Web Server to hang via a specially-crafted HTTP request.\n(CVE-2010-4476)\n\nUsers of JBoss Web Server should upgrade to these updated packages, which\ncontain a backported patch to correct this issue. The JBoss server process\nmust be restarted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0211", "url": "https://access.redhat.com/errata/RHSA-2011:0211" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0211.json" } ], "title": "Red Hat Security Advisory: jbossweb security update", "tracking": { "current_release_date": "2025-08-01T19:32:25+00:00", "generator": { "date": "2025-08-01T19:32:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2011:0211", "initial_release_date": "2011-02-10T19:33:00+00:00", "revision_history": [ { "date": "2011-02-10T19:33:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-02-10T14:36:25+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-01T19:32:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Platform 5 for RHEL 4 AS", "product": { "name": "Red Hat JBoss Web Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEWP-5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_platform:5::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Platform 5 for RHEL 4 ES", "product": { "name": "Red Hat JBoss Web Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEWP-5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_platform:5::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Web Platform 5 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Web Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEWP-5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_platform:5::el5" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Platform" }, { "branches": [ { "category": "product_version", "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product": { "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_id": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb-servlet-2.5-api@2.1.10-5.patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product": { "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_id": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.1.10-5.patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product": { "name": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_id": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb-lib@2.1.10-5.patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product": { "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_id": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb-jsp-2.1-api@2.1.10-5.patch01.1.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product": { "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_id": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb-jsp-2.1-api@2.1.10-5.patch01.1.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product": { "name": "jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_id": "jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb-lib@2.1.10-5.patch01.1.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product": { "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_id": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb-servlet-2.5-api@2.1.10-5.patch01.1.1.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product": { "name": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_id": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.1.10-5.patch01.1.1.ep5.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "product": { "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "product_id": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.1.10-5.patch01.1.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "product": { "name": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "product_id": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@2.1.10-5.patch01.1.1.ep5.el5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src as a component of Red Hat JBoss Web Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src" }, "product_reference": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "relates_to_product_reference": "4AS-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEWP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEWP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEWP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src as a component of Red Hat JBoss Web Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src" }, "product_reference": "jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "relates_to_product_reference": "4ES-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEWP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEWP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEWP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch" }, "product_reference": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" }, "product_reference": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src as a component of Red Hat JBoss Web Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src" }, "product_reference": "jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "relates_to_product_reference": "5Server-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEWP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" }, "product_reference": "jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEWP-5:jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" }, "product_reference": "jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch as a component of Red Hat JBoss Web Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEWP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" }, "product_reference": "jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEWP-5" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "4AS-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "4AS-JBEWP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "4ES-JBEWP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "5Server-JBEWP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEWP-5:jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEWP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" ], "known_not_affected": [ "4AS-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "4AS-JBEWP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "4ES-JBEWP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-02-10T19:33:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259", "product_ids": [ "5Server-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "5Server-JBEWP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEWP-5:jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEWP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0211" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "4AS-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "4AS-JBEWP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4AS-JBEWP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.ep5.el4.src", "4ES-JBEWP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:jbossweb-lib-0:2.1.10-5.patch01.1.ep5.el4.noarch", "4ES-JBEWP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.ep5.el4.noarch", "5Server-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEWP-5:jbossweb-0:2.1.10-5.patch01.1.1.ep5.el5.src", "5Server-JBEWP-5:jbossweb-jsp-2.1-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEWP-5:jbossweb-lib-0:2.1.10-5.patch01.1.1.ep5.el5.noarch", "5Server-JBEWP-5:jbossweb-servlet-2.5-api-0:2.1.10-5.patch01.1.1.ep5.el5.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
rhsa-2011:0335
Vulnerability from csaf_redhat
Published
2011-03-09 20:48
Modified
2025-08-01 19:30
Summary
Red Hat Security Advisory: tomcat6 security and bug fix update
Notes
Topic
Updated tomcat6 packages that fix two security issues and one bug are now
available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
Apache Tomcat is a servlet container for the Java Servlet and JavaServer
Pages (JSP) technologies.
A denial of service flaw was found in the way certain strings were
converted to Double objects. A remote attacker could use this flaw to cause
Tomcat to hang via a specially-crafted HTTP request. (CVE-2010-4476)
A flaw was found in the Tomcat NIO (Non-Blocking I/O) connector. A remote
attacker could use this flaw to cause a denial of service (out-of-memory
condition) via a specially-crafted request containing a large NIO buffer
size request value. (CVE-2011-0534)
This update also fixes the following bug:
* A bug in the "tomcat6" init script prevented additional Tomcat instances
from starting. As well, running "service tomcat6 start" caused
configuration options applied from "/etc/sysconfig/tomcat6" to be
overwritten with those from "/etc/tomcat6/tomcat6.conf". With this update,
multiple instances of Tomcat run as expected. (BZ#676922)
Users of Tomcat should upgrade to these updated packages, which contain
backported patches to correct these issues. Tomcat must be restarted for
this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated tomcat6 packages that fix two security issues and one bug are now\navailable for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer\nPages (JSP) technologies.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nTomcat to hang via a specially-crafted HTTP request. (CVE-2010-4476)\n\nA flaw was found in the Tomcat NIO (Non-Blocking I/O) connector. A remote\nattacker could use this flaw to cause a denial of service (out-of-memory\ncondition) via a specially-crafted request containing a large NIO buffer\nsize request value. (CVE-2011-0534)\n\nThis update also fixes the following bug:\n\n* A bug in the \"tomcat6\" init script prevented additional Tomcat instances\nfrom starting. As well, running \"service tomcat6 start\" caused\nconfiguration options applied from \"/etc/sysconfig/tomcat6\" to be\noverwritten with those from \"/etc/tomcat6/tomcat6.conf\". With this update,\nmultiple instances of Tomcat run as expected. (BZ#676922)\n\nUsers of Tomcat should upgrade to these updated packages, which contain\nbackported patches to correct these issues. Tomcat must be restarted for\nthis update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0335", "url": "https://access.redhat.com/errata/RHSA-2011:0335" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://tomcat.apache.org/security-6.html", "url": "http://tomcat.apache.org/security-6.html" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "675338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675338" }, { "category": "external", "summary": "676922", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=676922" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0335.json" } ], "title": "Red Hat Security Advisory: tomcat6 security and bug fix update", "tracking": { "current_release_date": "2025-08-01T19:30:53+00:00", "generator": { "date": "2025-08-01T19:30:53+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2011:0335", "initial_release_date": "2011-03-09T20:48:00+00:00", "revision_history": [ { "date": "2011-03-09T20:48:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-03-09T15:52:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-01T19:30:53+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "product": { "name": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "product_id": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-webapps@6.0.24-24.el6_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "product": { "name": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "product_id": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-docs-webapp@6.0.24-24.el6_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "product": { "name": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "product_id": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-log4j@6.0.24-24.el6_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "product": { "name": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "product_id": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-javadoc@6.0.24-24.el6_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "product": { "name": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "product_id": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-admin-webapps@6.0.24-24.el6_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "product": { "name": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "product_id": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-el-2.1-api@6.0.24-24.el6_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-lib-0:6.0.24-24.el6_0.noarch", "product": { "name": "tomcat6-lib-0:6.0.24-24.el6_0.noarch", "product_id": "tomcat6-lib-0:6.0.24-24.el6_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-lib@6.0.24-24.el6_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "product": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "product_id": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-jsp-2.1-api@6.0.24-24.el6_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-0:6.0.24-24.el6_0.noarch", "product": { "name": "tomcat6-0:6.0.24-24.el6_0.noarch", "product_id": "tomcat6-0:6.0.24-24.el6_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.24-24.el6_0?arch=noarch" } } }, { "category": "product_version", "name": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "product": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "product_id": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6-servlet-2.5-api@6.0.24-24.el6_0?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "tomcat6-0:6.0.24-24.el6_0.src", "product": { "name": "tomcat6-0:6.0.24-24.el6_0.src", "product_id": "tomcat6-0:6.0.24-24.el6_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/tomcat6@6.0.24-24.el6_0?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tomcat6-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-24.el6_0.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tomcat6-0:6.0.24-24.el6_0.src" }, "product_reference": "tomcat6-0:6.0.24-24.el6_0.src", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-lib-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Client-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-24.el6_0.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.src" }, "product_reference": "tomcat6-0:6.0.24-24.el6_0.src", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-lib-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6ComputeNode-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tomcat6-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-24.el6_0.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tomcat6-0:6.0.24-24.el6_0.src" }, "product_reference": "tomcat6-0:6.0.24-24.el6_0.src", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-lib-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tomcat6-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-24.el6_0.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tomcat6-0:6.0.24-24.el6_0.src" }, "product_reference": "tomcat6-0:6.0.24-24.el6_0.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tomcat6-lib-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-lib-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tomcat6-log4j-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:tomcat6-webapps-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-24.el6_0.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.src" }, "product_reference": "tomcat6-0:6.0.24-24.el6_0.src", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-lib-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation-optional" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tomcat6-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-0:6.0.24-24.el6_0.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tomcat6-0:6.0.24-24.el6_0.src" }, "product_reference": "tomcat6-0:6.0.24-24.el6_0.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-lib-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tomcat6-lib-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-lib-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tomcat6-log4j-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:tomcat6-webapps-0:6.0.24-24.el6_0.noarch" }, "product_reference": "tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Client-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.src", "6ComputeNode-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Server-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-0:6.0.24-24.el6_0.src", "6Server:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Workstation-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-0:6.0.24-24.el6_0.src", "6Workstation:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-webapps-0:6.0.24-24.el6_0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-09T20:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Client-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.src", "6ComputeNode-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Server-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-0:6.0.24-24.el6_0.src", "6Server:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Workstation-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-0:6.0.24-24.el6_0.src", "6Workstation:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-webapps-0:6.0.24-24.el6_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0335" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Client-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.src", "6ComputeNode-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Server-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-0:6.0.24-24.el6_0.src", "6Server:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Workstation-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-0:6.0.24-24.el6_0.src", "6Workstation:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-webapps-0:6.0.24-24.el6_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" }, { "cve": "CVE-2011-0534", "discovery_date": "2011-02-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "675338" } ], "notes": [ { "category": "description", "text": "Apache Tomcat 7.0.0 through 7.0.6 and 6.0.0 through 6.0.30 does not enforce the maxHttpHeaderSize limit for requests involving the NIO HTTP connector, which allows remote attackers to cause a denial of service (OutOfMemoryError) via a crafted request.", "title": "Vulnerability description" }, { "category": "summary", "text": "tomcat: remote DoS via NIO connector", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Client-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.src", "6ComputeNode-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Server-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-0:6.0.24-24.el6_0.src", "6Server:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Workstation-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-0:6.0.24-24.el6_0.src", "6Workstation:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-webapps-0:6.0.24-24.el6_0.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0534" }, { "category": "external", "summary": "RHBZ#675338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=675338" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0534", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0534" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0534", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0534" } ], "release_date": "2011-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-09T20:48:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259", "product_ids": [ "6Client-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Client-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.src", "6ComputeNode-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Server-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-0:6.0.24-24.el6_0.src", "6Server:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Workstation-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-0:6.0.24-24.el6_0.src", "6Workstation:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-webapps-0:6.0.24-24.el6_0.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0335" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Client-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Client-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Client-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-0:6.0.24-24.el6_0.src", "6ComputeNode-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6ComputeNode-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Server-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Server-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-0:6.0.24-24.el6_0.src", "6Server:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Server:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-0:6.0.24-24.el6_0.src", "6Workstation-optional:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Workstation-optional:tomcat6-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-0:6.0.24-24.el6_0.src", "6Workstation:tomcat6-admin-webapps-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-docs-webapp-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-el-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-javadoc-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-jsp-2.1-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-lib-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-log4j-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-servlet-2.5-api-0:6.0.24-24.el6_0.noarch", "6Workstation:tomcat6-webapps-0:6.0.24-24.el6_0.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "tomcat: remote DoS via NIO connector" } ] }
rhsa-2011:0334
Vulnerability from csaf_redhat
Published
2011-03-09 18:44
Modified
2025-08-01 19:30
Summary
Red Hat Security Advisory: JBoss Enterprise Portal Platform 4.3.CP06 and 5.1.0 security update
Notes
Topic
Updated jbossweb-2.0.0.jar and jbossweb-2.1.10.jar files for JBoss
Enterprise Portal Platform 4.3.CP06 and 5.1.0 that fix one security issue
are now available from the Red Hat Customer Portal.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
JBoss Enterprise Portal Platform is the open source implementation of the
Java EE suite of services and Portal services running atop JBoss Enterprise
Application Platform. It comprises a set of offerings for enterprise
customers who are looking for pre-configured profiles of JBoss Enterprise
Middleware components that have been tested and certified together to
provide an integrated experience.
A denial of service flaw was found in the way certain strings were
converted to Double objects. A remote attacker could use this flaw to cause
JBoss Web Server to hang via a specially-crafted HTTP request.
(CVE-2010-4476)
All users of JBoss Enterprise Portal Platform 4.3.CP06 and 5.1.0 as
provided from the Red Hat Customer Portal are advised to install this
update. Refer to the Solution section of this erratum for update
instructions.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated jbossweb-2.0.0.jar and jbossweb-2.1.10.jar files for JBoss\nEnterprise Portal Platform 4.3.CP06 and 5.1.0 that fix one security issue\nare now available from the Red Hat Customer Portal.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "JBoss Enterprise Portal Platform is the open source implementation of the\nJava EE suite of services and Portal services running atop JBoss Enterprise\nApplication Platform. It comprises a set of offerings for enterprise\ncustomers who are looking for pre-configured profiles of JBoss Enterprise\nMiddleware components that have been tested and certified together to\nprovide an integrated experience.\n\nA denial of service flaw was found in the way certain strings were\nconverted to Double objects. A remote attacker could use this flaw to cause\nJBoss Web Server to hang via a specially-crafted HTTP request.\n(CVE-2010-4476)\n\nAll users of JBoss Enterprise Portal Platform 4.3.CP06 and 5.1.0 as\nprovided from the Red Hat Customer Portal are advised to install this\nupdate. Refer to the Solution section of this erratum for update\ninstructions.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0334", "url": "https://access.redhat.com/errata/RHSA-2011:0334" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0334.json" } ], "title": "Red Hat Security Advisory: JBoss Enterprise Portal Platform 4.3.CP06 and 5.1.0 security update", "tracking": { "current_release_date": "2025-08-01T19:30:49+00:00", "generator": { "date": "2025-08-01T19:30:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.6" } }, "id": "RHSA-2011:0334", "initial_release_date": "2011-03-09T18:44:00+00:00", "revision_history": [ { "date": "2011-03-09T18:44:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-03-09T13:46:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-08-01T19:30:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Portal 4.3", "product": { "name": "Red Hat JBoss Portal 4.3", "product_id": "Red Hat JBoss Portal 4.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_portal_platform:4.3" } } }, { "category": "product_name", "name": "Red Hat JBoss Portal 5", "product": { "name": "Red Hat JBoss Portal 5", "product_id": "Red Hat JBoss Portal 5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_portal_platform:5" } } } ], "category": "product_family", "name": "Red Hat JBoss Middleware" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-4476", "discovery_date": "2011-02-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "674336" } ], "notes": [ { "category": "description", "text": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "title": "Vulnerability description" }, { "category": "summary", "text": "JDK Double.parseDouble Denial-Of-Service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal 4.3", "Red Hat JBoss Portal 5" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4476" }, { "category": "external", "summary": "RHBZ#674336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=674336" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4476", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4476" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" } ], "release_date": "2011-02-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-09T18:44:00+00:00", "details": "Updated jbossweb-2.0.0.jar (for 4.3.CP06) and jbossweb-2.1.10.jar (for\n5.1.0) files that fix CVE-2010-4476 for JBoss Enterprise Portal Platform\n4.3.CP06 and 5.1.0 are available from the Red Hat Customer Portal. To\ndownload and install the updated files:\n\n1) Log into the Customer Portal: https://access.redhat.com/login\n\n2) Navigate to\nhttps://access.redhat.com/jbossnetwork/restricted/listSoftware.html\n\n3) On the left-hand side menu, under \"JBoss Enterprise Platforms\" click\n\"Portal Platform\". Then, using the \"Version:\" drop down menu, select the\nPortal Platform version you are using, such as \"4.3 CP06\" or \"5.1.0\".\n\n4) From the \"Security Advisories\" tab, click the \"CVE-2010-4476 JBossweb\nupdate fixing JDK double bug...\" link in the \"Download File\" column. The\n\"Software Details\" page is displayed, where you can download the update\nand view installation instructions.\n\n5) Backup your existing jbossweb.jar file (refer to the \"Software Details\"\npage, from step 4, for the location of this file).\n\n6) After downloading the update, ensure you backed up your existing\njbossweb.jar file as per step 5, and then follow the manual installation\nstep on the \"Software Details\" page. After installing the update, the JBoss\nserver process must be restarted for the update to take effect.", "product_ids": [ "Red Hat JBoss Portal 4.3", "Red Hat JBoss Portal 5" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0334" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Portal 4.3", "Red Hat JBoss Portal 5" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "JDK Double.parseDouble Denial-Of-Service" } ] }
cve-2010-4476
Vulnerability from jvndb
Published
2011-03-04 19:29
Modified
2018-02-07 17:10
Summary
IBM DB2 vulnerable to denial-of-service (DoS)
Details
IBM DB2 contains a denial-of-service (DoS) vulnerability.
IBM DB2 contains a denial-of-service (DoS) vulnerability due to an issue in Java Runtime Environment (JRE).
References
► | Type | URL | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000016.html", "dc:date": "2018-02-07T17:10+09:00", "dcterms:issued": "2011-03-04T19:29+09:00", "dcterms:modified": "2018-02-07T17:10+09:00", "description": "IBM DB2 contains a denial-of-service (DoS) vulnerability.\r\n\r\nIBM DB2 contains a denial-of-service (DoS) vulnerability due to an issue in Java Runtime Environment (JRE).", "link": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000016.html", "sec:cpe": [ { "#text": "cpe:/a:hp:systems_insight_manager", "@product": "HP Systems Insight Manager", "@vendor": "Hewlett-Packard Development Company,L.P", "@version": "2.2" }, { "#text": "cpe:/a:ibm:db2", "@product": "IBM DB2", "@vendor": "IBM Corporation", "@version": "2.2" } ], "sec:cvss": { "@score": "4.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "@version": "2.0" }, "sec:identifier": "JVNDB-2011-000016", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN16308183/index.html", "@id": "JVN#16308183", "@source": "JVN" }, { "#text": "https://jvn.jp/en/tr/JVNTR-2011-02/index.html", "@id": "JVNTR-2011-02", "@source": "JVNTR" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4476", "@id": "CVE-2010-4476", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4476", "@id": "CVE-2010-4476", "@source": "NVD" }, { "#text": "http://secunia.com/advisories/43295", "@id": "SA43295", "@source": "SECUNIA" }, { "#text": "http://www.securitytracker.com/id?1025062", "@id": "1025062", "@source": "SECTRACK" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-189", "@title": "Numeric Errors(CWE-189)" } ], "title": "IBM DB2 vulnerable to denial-of-service (DoS)" }
cve-2010-4476
Vulnerability from jvndb
Published
2011-03-04 19:28
Modified
2018-02-07 17:10
Summary
IBM Lotus vulnerable to denial-of-service (DoS)
Details
IBM Lotus product line contains a denial-of-service (DoS) vulnerability.
IBM Lotus product line contains a denial-of-service (DoS) vulnerability due to an issue in Java Runtime Environment (JRE).
References
► | Type | URL | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
► | Vendor | Product | ||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000018.html", "dc:date": "2018-02-07T17:10+09:00", "dcterms:issued": "2011-03-04T19:28+09:00", "dcterms:modified": "2018-02-07T17:10+09:00", "description": "IBM Lotus product line contains a denial-of-service (DoS) vulnerability.\r\n\r\nIBM Lotus product line contains a denial-of-service (DoS) vulnerability due to an issue in Java Runtime Environment (JRE).", "link": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000018.html", "sec:cpe": [ { "#text": "cpe:/a:hp:systems_insight_manager", "@product": "HP Systems Insight Manager", "@vendor": "Hewlett-Packard Development Company,L.P", "@version": "2.2" }, { "#text": "cpe:/a:ibm:ibm_forms", "@product": "IBM Forms", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:ibm_mashup_center", "@product": "IBM Mashup Center", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:lotus_activeinsight", "@product": "Lotus ActiveInsight", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:lotus_connections", "@product": "Lotus Connections", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:lotus_expeditor", "@product": "IBM Lotus Expeditor", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:lotus_mashups", "@product": "Lotus Mashups", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:lotus_quickr", "@product": "IBM Lotus Quickr", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:lotus_sametime_advanced", "@product": "Lotus Sametime Advanced", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:lotus_sametime_standard", "@product": "Lotus Sametime Standard", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:lotus_sametime_unified_telephony", "@product": "Lotus Sametime Unified Telephony", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:lotus_web_content_management", "@product": "Lotus Web Content Management", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:lotus_workforce_management", "@product": "Lotus Workforce Management", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:websphere_dashboard_framework", "@product": "IBM WebSphere Dashboard Framework", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:websphere_portlet_factory", "@product": "WebSphere Portlet Factory", "@vendor": "IBM Corporation", "@version": "2.2" }, { "#text": "cpe:/a:ibm:workplace_web_content_management", "@product": "Workplace Web Content Management", "@vendor": "IBM Corporation", "@version": "2.2" } ], "sec:cvss": { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "@version": "2.0" }, "sec:identifier": "JVNDB-2011-000018", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN97334690/index.html", "@id": "JVN#97334690", "@source": "JVN" }, { "#text": "https://jvn.jp/en/tr/JVNTR-2011-02/index.html", "@id": "JVNTR-2011-02", "@source": "JVNTR" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4476", "@id": "CVE-2010-4476", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4476", "@id": "CVE-2010-4476", "@source": "NVD" }, { "#text": "http://secunia.com/advisories/43295", "@id": "SA43295", "@source": "SECUNIA" }, { "#text": "http://www.securitytracker.com/id?1025062", "@id": "1025062", "@source": "SECTRACK" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-189", "@title": "Numeric Errors(CWE-189)" } ], "title": "IBM Lotus vulnerable to denial-of-service (DoS)" }
cve-2010-4476
Vulnerability from jvndb
Published
2011-03-04 19:29
Modified
2018-02-07 17:10
Summary
IBM WebSphere Application Server vulnerable to denial-of-service (DoS)
Details
IBM WebSphere Application Server (WAS) contains a denial-of-service (DoS) vulnerability.
IBM WebSphere Application Server contains a denial-of-service (DoS) vulnerability due to an issue in Java Runtime Environment (JRE).
According to the developer:
" For other IBM software products that contain an affected version of WAS, require an update. Specifically, WebSphere Process Server (WPS), WebSphere Enterprise Service Bus (WESB), WebSphere Virtual Enterprise (WVE), WebSphere Commerce and others are applicable. Also, IBM HTTP Server is not affected by this vulnerability."
References
► | Type | URL | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000017.html", "dc:date": "2018-02-07T17:10+09:00", "dcterms:issued": "2011-03-04T19:29+09:00", "dcterms:modified": "2018-02-07T17:10+09:00", "description": "IBM WebSphere Application Server (WAS) contains a denial-of-service (DoS) vulnerability.\r\n\r\nIBM WebSphere Application Server contains a denial-of-service (DoS) vulnerability due to an issue in Java Runtime Environment (JRE).\r\n\r\nAccording to the developer:\r\n\r\n\" For other IBM software products that contain an affected version of WAS, require an update. Specifically, WebSphere Process Server (WPS), WebSphere Enterprise Service Bus (WESB), WebSphere Virtual Enterprise (WVE), WebSphere Commerce and others are applicable. Also, IBM HTTP Server is not affected by this vulnerability.\"", "link": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000017.html", "sec:cpe": [ { "#text": "cpe:/a:hp:systems_insight_manager", "@product": "HP Systems Insight Manager", "@vendor": "Hewlett-Packard Development Company,L.P", "@version": "2.2" }, { "#text": "cpe:/a:ibm:websphere_application_server", "@product": "IBM WebSphere Application Server", "@vendor": "IBM Corporation", "@version": "2.2" } ], "sec:cvss": { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "@version": "2.0" }, "sec:identifier": "JVNDB-2011-000017", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN26301278/index.html", "@id": "JVN#26301278", "@source": "JVN" }, { "#text": "https://jvn.jp/en/tr/JVNTR-2011-02/index.html", "@id": "JVNTR-2011-02", "@source": "JVNTR" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4476", "@id": "CVE-2010-4476", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4476", "@id": "CVE-2010-4476", "@source": "NVD" }, { "#text": "http://secunia.com/advisories/43295", "@id": "SA43295", "@source": "SECUNIA" }, { "#text": "http://www.securitytracker.com/id?1025062", "@id": "1025062", "@source": "SECTRACK" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-189", "@title": "Numeric Errors(CWE-189)" } ], "title": "IBM WebSphere Application Server vulnerable to denial-of-service (DoS)" }
cve-2010-4476
Vulnerability from jvndb
Published
2011-03-10 16:38
Modified
2018-02-07 17:10
Summary
IBM Tivoli vulnerable to denial-of-service (DoS)
Details
IBM Tivoli contains a denial-of-service (DoS) vulnerability.
IBM Tivoli contains a denial-of-service (DoS) vulnerability due to an issue in Java Runtime Environment (JRE).
A wide range of products are affected. For more information, refer to the vendor's website.
References
► | Type | URL | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000020.html", "dc:date": "2018-02-07T17:10+09:00", "dcterms:issued": "2011-03-10T16:38+09:00", "dcterms:modified": "2018-02-07T17:10+09:00", "description": "IBM Tivoli contains a denial-of-service (DoS) vulnerability.\r\n\r\nIBM Tivoli contains a denial-of-service (DoS) vulnerability due to an issue in Java Runtime Environment (JRE).\r\n\r\nA wide range of products are affected. For more information, refer to the vendor\u0027s website.", "link": "https://jvndb.jvn.jp/en/contents/2011/JVNDB-2011-000020.html", "sec:cpe": [ { "#text": "cpe:/a:hp:systems_insight_manager", "@product": "HP Systems Insight Manager", "@vendor": "Hewlett-Packard Development Company,L.P", "@version": "2.2" }, { "#text": "cpe:/a:sun:jdk", "@product": "JDK", "@vendor": "Sun Microsystems, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:sun:jre", "@product": "JRE", "@vendor": "Sun Microsystems, Inc.", "@version": "2.2" }, { "#text": "cpe:/a:sun:sdk", "@product": "SDK", "@vendor": "Sun Microsystems, Inc.", "@version": "2.2" } ], "sec:cvss": { "@score": "5.0", "@severity": "Medium", "@type": "Base", "@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "@version": "2.0" }, "sec:identifier": "JVNDB-2011-000020", "sec:references": [ { "#text": "http://jvn.jp/en/jp/JVN81294135/index.html", "@id": "JVN#81294135", "@source": "JVN" }, { "#text": "https://jvn.jp/en/tr/JVNTR-2011-02/index.html", "@id": "JVNTR-2011-02", "@source": "JVNTR" }, { "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4476", "@id": "CVE-2010-4476", "@source": "CVE" }, { "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4476", "@id": "CVE-2010-4476", "@source": "NVD" }, { "#text": "http://www.securitytracker.com/id?1025062", "@id": "1025062", "@source": "SECTRACK" }, { "#text": "http://secunia.com/advisories/43295", "@id": "SA43295", "@source": "SECUNIA-R" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-189", "@title": "Numeric Errors(CWE-189)" } ], "title": "IBM Tivoli vulnerable to denial-of-service (DoS)" }
ghsa-gvgc-rxmh-5hvw
Vulnerability from github
Published
2022-05-14 02:16
Modified
2024-02-27 21:57
VLAI Severity ?
Summary
Apache Tomcat affected by infinite loop in Double.parseDouble method in Java Runtime Environment
Details
The Double.parseDouble
method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
Apache Tomcat introduced workarounds to avoid being affected by this issue in versions 7.0.7, 6.0.32, and 5.5.33.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat" }, "ranges": [ { "events": [ { "introduced": "7.0.0" }, { "fixed": "7.0.7" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat" }, "ranges": [ { "events": [ { "introduced": "6.0.0" }, { "fixed": "6.0.32" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.tomcat:tomcat" }, "ranges": [ { "events": [ { "introduced": "5.5.0" }, { "fixed": "5.5.33" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2010-4476" ], "database_specific": { "cwe_ids": [], "github_reviewed": true, "github_reviewed_at": "2024-02-27T21:57:19Z", "nvd_published_at": "2011-02-17T19:00:00Z", "severity": "MODERATE" }, "details": "The `Double.parseDouble` method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.\n\nApache Tomcat introduced workarounds to avoid being affected by this issue in versions 7.0.7, 6.0.32, and 5.5.33.", "id": "GHSA-gvgc-rxmh-5hvw", "modified": "2024-02-27T21:57:20Z", "published": "2022-05-14T02:16:07Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4476" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/407841c426dc52a4c6b8ccd297df6c484a540056" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/69ef147c4498397e8f644a0699cf588b45a05120" }, { "type": "WEB", "url": "https://github.com/apache/tomcat/commit/b0c1eeaa0d303bcb42651b222037e079d0634c01" }, { "type": "PACKAGE", "url": "https://github.com/apache/tomcat" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12662" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12745" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14328" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14589" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19493" }, { "type": "WEB", "url": "https://svn.apache.org/viewvc?view=revision\u0026revision=1066244" }, { "type": "WEB", "url": "https://svn.apache.org/viewvc?view=revision\u0026revision=1066315" }, { "type": "WEB", "url": "https://svn.apache.org/viewvc?view=revision\u0026revision=1066318" }, { "type": "WEB", "url": "https://tomcat.apache.org/security-5.html" }, { "type": "WEB", "url": "https://tomcat.apache.org/security-6.html" }, { "type": "WEB", "url": "https://tomcat.apache.org/security-7.html" }, { "type": "WEB", "url": "http://blog.fortify.com/blog/2011/02/08/Double-Trouble" }, { "type": "WEB", "url": "http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053926.html" }, { "type": "WEB", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053934.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=130168502603566\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=130270785502599\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=130497132406206\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=130497185606818\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "type": "WEB", "url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ94423" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM31983" }, { "type": "WEB", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468358" }, { "type": "WEB", "url": "http://www.debian.org/security/2011/dsa-2161" }, { "type": "WEB", "url": "http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308" }, { "type": "WEB", "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html" }, { "type": "WEB", "url": "http://www.ibm.com/support/docview.wss?uid=swg24029497" }, { "type": "WEB", "url": "http://www.ibm.com/support/docview.wss?uid=swg24029498" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:054" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html" }, { "type": "WEB", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0210.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0211.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0212.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0213.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0214.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0282.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0333.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0334.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html" }, { "type": "WEB", "url": "http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" } ], "schema_version": "1.4.0", "severity": [], "summary": "Apache Tomcat affected by infinite loop in Double.parseDouble method in Java Runtime Environment" }
fkie_cve-2010-4476
Vulnerability from fkie_nvd
Published
2011-02-17 19:00
Modified
2025-04-11 00:51
Severity ?
Summary
The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
References
▶ | URL | Tags | |
---|---|---|---|
secalert_us@oracle.com | http://blog.fortify.com/blog/2011/02/08/Double-Trouble | ||
secalert_us@oracle.com | http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html | ||
secalert_us@oracle.com | http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053926.html | ||
secalert_us@oracle.com | http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053934.html | ||
secalert_us@oracle.com | http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html | ||
secalert_us@oracle.com | http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html | ||
secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=129899347607632&w=2 | ||
secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=129899347607632&w=2 | ||
secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=129960314701922&w=2 | ||
secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=129960314701922&w=2 | ||
secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=130168502603566&w=2 | ||
secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=130270785502599&w=2 | ||
secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=130497132406206&w=2 | ||
secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=130497185606818&w=2 | ||
secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=130514352726432&w=2 | ||
secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=130514352726432&w=2 | ||
secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=131041767210772&w=2 | ||
secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=131041767210772&w=2 | ||
secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=132215163318824&w=2 | ||
secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=132215163318824&w=2 | ||
secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=133469267822771&w=2 | ||
secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=133469267822771&w=2 | ||
secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=133728004526190&w=2 | ||
secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=133728004526190&w=2 | ||
secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=134254866602253&w=2 | ||
secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=134254957702612&w=2 | ||
secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=134254957702612&w=2 | ||
secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=136485229118404&w=2 | ||
secalert_us@oracle.com | http://marc.info/?l=bugtraq&m=136485229118404&w=2 | ||
secalert_us@oracle.com | http://secunia.com/advisories/43048 | Vendor Advisory | |
secalert_us@oracle.com | http://secunia.com/advisories/43280 | Vendor Advisory | |
secalert_us@oracle.com | http://secunia.com/advisories/43295 | Vendor Advisory | |
secalert_us@oracle.com | http://secunia.com/advisories/43304 | Vendor Advisory | |
secalert_us@oracle.com | http://secunia.com/advisories/43333 | Vendor Advisory | |
secalert_us@oracle.com | http://secunia.com/advisories/43378 | Vendor Advisory | |
secalert_us@oracle.com | http://secunia.com/advisories/43400 | Vendor Advisory | |
secalert_us@oracle.com | http://secunia.com/advisories/43659 | Vendor Advisory | |
secalert_us@oracle.com | http://secunia.com/advisories/44954 | ||
secalert_us@oracle.com | http://secunia.com/advisories/45022 | ||
secalert_us@oracle.com | http://secunia.com/advisories/45555 | Vendor Advisory | |
secalert_us@oracle.com | http://secunia.com/advisories/49198 | ||
secalert_us@oracle.com | http://security.gentoo.org/glsa/glsa-201406-32.xml | ||
secalert_us@oracle.com | http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html | ||
secalert_us@oracle.com | http://www-01.ibm.com/support/docview.wss?uid=swg1IZ94423 | ||
secalert_us@oracle.com | http://www-01.ibm.com/support/docview.wss?uid=swg1PM31983 | ||
secalert_us@oracle.com | http://www-01.ibm.com/support/docview.wss?uid=swg21468358 | ||
secalert_us@oracle.com | http://www.debian.org/security/2011/dsa-2161 | ||
secalert_us@oracle.com | http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/ | ||
secalert_us@oracle.com | http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html | ||
secalert_us@oracle.com | http://www.ibm.com/support/docview.wss?uid=swg24029497 | ||
secalert_us@oracle.com | http://www.ibm.com/support/docview.wss?uid=swg24029498 | ||
secalert_us@oracle.com | http://www.mandriva.com/security/advisories?name=MDVSA-2011:054 | ||
secalert_us@oracle.com | http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html | Patch, Vendor Advisory | |
secalert_us@oracle.com | http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html | Patch, Vendor Advisory | |
secalert_us@oracle.com | http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html | Patch, Vendor Advisory | |
secalert_us@oracle.com | http://www.redhat.com/support/errata/RHSA-2011-0210.html | Vendor Advisory | |
secalert_us@oracle.com | http://www.redhat.com/support/errata/RHSA-2011-0211.html | Vendor Advisory | |
secalert_us@oracle.com | http://www.redhat.com/support/errata/RHSA-2011-0212.html | Vendor Advisory | |
secalert_us@oracle.com | http://www.redhat.com/support/errata/RHSA-2011-0213.html | Vendor Advisory | |
secalert_us@oracle.com | http://www.redhat.com/support/errata/RHSA-2011-0214.html | Vendor Advisory | |
secalert_us@oracle.com | http://www.redhat.com/support/errata/RHSA-2011-0282.html | Vendor Advisory | |
secalert_us@oracle.com | http://www.redhat.com/support/errata/RHSA-2011-0333.html | Vendor Advisory | |
secalert_us@oracle.com | http://www.redhat.com/support/errata/RHSA-2011-0334.html | Vendor Advisory | |
secalert_us@oracle.com | http://www.redhat.com/support/errata/RHSA-2011-0880.html | Vendor Advisory | |
secalert_us@oracle.com | http://www.securitytracker.com/id?1025062 | ||
secalert_us@oracle.com | http://www.vupen.com/english/advisories/2011/0365 | Vendor Advisory | |
secalert_us@oracle.com | http://www.vupen.com/english/advisories/2011/0377 | Vendor Advisory | |
secalert_us@oracle.com | http://www.vupen.com/english/advisories/2011/0379 | Vendor Advisory | |
secalert_us@oracle.com | http://www.vupen.com/english/advisories/2011/0422 | Vendor Advisory | |
secalert_us@oracle.com | http://www.vupen.com/english/advisories/2011/0434 | Vendor Advisory | |
secalert_us@oracle.com | http://www.vupen.com/english/advisories/2011/0605 | Vendor Advisory | |
secalert_us@oracle.com | http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715&admit=109447627+1298159618320+28353475 | ||
secalert_us@oracle.com | http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715&admit=109447627+1298159618320+28353475 | ||
secalert_us@oracle.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12662 | ||
secalert_us@oracle.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12745 | ||
secalert_us@oracle.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14328 | ||
secalert_us@oracle.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14589 | ||
secalert_us@oracle.com | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19493 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://blog.fortify.com/blog/2011/02/08/Double-Trouble | ||
af854a3a-2127-422b-91ae-364da2661108 | http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053926.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053934.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=129899347607632&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=129899347607632&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=129960314701922&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=129960314701922&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=130168502603566&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=130270785502599&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=130497132406206&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=130497185606818&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=130514352726432&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=130514352726432&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=131041767210772&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=131041767210772&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=132215163318824&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=132215163318824&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=133469267822771&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=133469267822771&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=133728004526190&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=133728004526190&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=134254866602253&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=134254957702612&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=134254957702612&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=136485229118404&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=136485229118404&w=2 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43048 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43280 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43295 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43304 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43333 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43378 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43400 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/43659 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/44954 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/45022 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/45555 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/49198 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201406-32.xml | ||
af854a3a-2127-422b-91ae-364da2661108 | http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg1IZ94423 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg1PM31983 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21468358 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2011/dsa-2161 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/ | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ibm.com/support/docview.wss?uid=swg24029497 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.ibm.com/support/docview.wss?uid=swg24029498 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2011:054 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0210.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0211.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0212.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0213.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0214.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0282.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0333.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0334.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.redhat.com/support/errata/RHSA-2011-0880.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025062 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0365 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0377 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0379 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0422 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0434 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2011/0605 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715&admit=109447627+1298159618320+28353475 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715&admit=109447627+1298159618320+28353475 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12662 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12745 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14328 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14589 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19493 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
sun | jre | * | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jre | 1.6.0 | |
sun | jdk | * | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | 1.6.0 | |
sun | jdk | * | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | jdk | 1.5.0 | |
sun | sdk | * | |
sun | sdk | 1.4.2 | |
sun | sdk | 1.4.2_1 | |
sun | sdk | 1.4.2_02 | |
sun | sdk | 1.4.2_3 | |
sun | sdk | 1.4.2_4 | |
sun | sdk | 1.4.2_5 | |
sun | sdk | 1.4.2_6 | |
sun | sdk | 1.4.2_7 | |
sun | sdk | 1.4.2_8 | |
sun | sdk | 1.4.2_9 | |
sun | sdk | 1.4.2_10 | |
sun | sdk | 1.4.2_11 | |
sun | sdk | 1.4.2_12 | |
sun | sdk | 1.4.2_13 | |
sun | sdk | 1.4.2_14 | |
sun | sdk | 1.4.2_15 | |
sun | sdk | 1.4.2_16 | |
sun | sdk | 1.4.2_17 | |
sun | sdk | 1.4.2_18 | |
sun | sdk | 1.4.2_19 | |
sun | sdk | 1.4.2_20 | |
sun | sdk | 1.4.2_21 | |
sun | sdk | 1.4.2_22 | |
sun | sdk | 1.4.2_23 | |
sun | sdk | 1.4.2_24 | |
sun | sdk | 1.4.2_25 | |
sun | sdk | 1.4.2_26 | |
sun | sdk | 1.4.2_27 | |
sun | sdk | 1.4.2_28 | |
sun | jre | * | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | 1.5.0 | |
sun | jre | * | |
sun | jre | 1.4.2 | |
sun | jre | 1.4.2_1 | |
sun | jre | 1.4.2_2 | |
sun | jre | 1.4.2_3 | |
sun | jre | 1.4.2_4 | |
sun | jre | 1.4.2_5 | |
sun | jre | 1.4.2_6 | |
sun | jre | 1.4.2_7 | |
sun | jre | 1.4.2_8 | |
sun | jre | 1.4.2_9 | |
sun | jre | 1.4.2_10 | |
sun | jre | 1.4.2_11 | |
sun | jre | 1.4.2_12 | |
sun | jre | 1.4.2_13 | |
sun | jre | 1.4.2_14 | |
sun | jre | 1.4.2_15 | |
sun | jre | 1.4.2_16 | |
sun | jre | 1.4.2_17 | |
sun | jre | 1.4.2_18 | |
sun | jre | 1.4.2_19 | |
sun | jre | 1.4.2_20 | |
sun | jre | 1.4.2_21 | |
sun | jre | 1.4.2_22 | |
sun | jre | 1.4.2_23 | |
sun | jre | 1.4.2_24 | |
sun | jre | 1.4.2_25 | |
sun | jre | 1.4.2_26 | |
sun | jre | 1.4.2_27 | |
sun | jre | 1.4.2_28 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jre:*:update_23:*:*:*:*:*:*", "matchCriteriaId": "0863352B-4389-466F-9240-90944DB1B932", "versionEndIncluding": "1.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "CBCD143C-057D-4F42-B487-46801E14ACF7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "matchCriteriaId": "09027C19-D442-446F-B7A8-21DB6787CF43", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "0A0FEC28-0707-4F42-9740-78F3D2D551EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "C3C5879A-A608-4230-9DC1-C27F0F48A13B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "0C71089A-BDDE-41FC-9DF9-9AEF4C2374DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "2DBB6B73-8D6B-41FF-BEE0-E0C7F5F1EB41", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "12A3B254-8580-45DB-BDE4-5B5A29CBFFB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "1DB1DE6A-66AE-499B-AD92-9E6ACE474C6D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "AADBB4F9-E43E-428B-9979-F47A15696C85", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "49260B94-05DE-4B78-9068-6F5F6BFDD19E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "C4FDE9EB-08FE-436E-A265-30E83B15DB23", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "BE409D5C-8F9F-4DE9-ACB7-0E0B813F6399", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "7158D2C0-E9AC-4CD6-B777-EA7B7A181997", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "B08C075B-9FC0-4381-A9E4-FFF0362BD308", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "F587E635-3A15-4186-B6A1-F99BE0A56820", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_22:*:*:*:*:*:*", "matchCriteriaId": "188D2242-7D16-4F8E-AB61-4663804AAC17", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "90EC6C13-4B37-48E5-8199-A702A944D5A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "2528152C-E20A-4D97-931C-A5EC3CEAA06D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "A99DAB4C-272B-4C91-BC70-7729E1152590", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "30DFC10A-A4D9-4F89-B17C-AB9260087D29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "272A5C44-18EC-41A9-8233-E9D4D0734EA6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jdk:*:update_23:*:*:*:*:*:*", "matchCriteriaId": "F647BC01-31B7-4FF9-B77B-FD4F5B3E708D", "versionEndIncluding": "1.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A3A4FEC7-A4A0-4B5C-A56C-8F80AE19865E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "matchCriteriaId": "722A93D8-B5BC-42F3-92A2-E424F61269A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "matchCriteriaId": "775F2611-F11C-4B84-8F40-0D034B81BF18", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "matchCriteriaId": "F20FDD9F-FF45-48BC-9207-54FB02E76071", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "matchCriteriaId": "9FA326F5-894A-4B01-BCA3-B126DA81CA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "matchCriteriaId": "228AB7B4-4BA4-43D4-B562-D438884DB152", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "matchCriteriaId": "AFD5C688-2103-4D60-979E-D9BE69A989C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "matchCriteriaId": "21421215-F722-4207-A2E5-E2DF4B29859B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*", "matchCriteriaId": "BFB9EA23-0EF7-4582-A265-3F5AA9EC81B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*", "matchCriteriaId": "C367B418-659E-4627-B1F1-1B1216C99055", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*", "matchCriteriaId": "CD5E6D4E-DDDD-4B45-B5E9-F8A916287AF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*", "matchCriteriaId": "7358492A-491C-491E-AEDF-63CB82619BAA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*", "matchCriteriaId": "C3DACAAF-AFDC-4391-9E85-344F30937F76", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_22:*:*:*:*:*:*", "matchCriteriaId": "ECEDE405-CEF6-4E52-A8AE-28B9274B2289", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "D98175BF-B084-4FA5-899D-9E80DC3923EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "matchCriteriaId": "820632CE-F8DF-47EE-B716-7530E60008B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "matchCriteriaId": "FA2BD0A3-7B2D-447B-ABAC-7B867B03B632", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "matchCriteriaId": "D54AB785-E9B7-47BD-B756-0C3A629D67DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "matchCriteriaId": "E9412098-0353-4F7B-9245-010557E6C651", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*", "matchCriteriaId": "AD30DAEB-4893-41CF-A455-B69C463B9337", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*", "matchCriteriaId": "21D6CE7E-A036-496C-8E08-A87F62B5290A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*", "matchCriteriaId": "B8F93BBE-1E8C-4EB3-BCC7-20AB2D813F98", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jdk:*:update27:*:*:*:*:*:*", "matchCriteriaId": "B32A75D7-8038-413A-BDB8-43C9A6DE33F0", "versionEndIncluding": "1.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "A02CF738-1B4F-44D0-A618-3D3E4EF1C9B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*", "matchCriteriaId": "EE8E883F-E13D-4FB0-8C6F-B7628600E8D4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*", "matchCriteriaId": "2AADA633-EB11-49A0-8E40-66589034F03E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*", "matchCriteriaId": "19DC29C5-1B9F-46DF-ACF6-3FF93E45777D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*", "matchCriteriaId": "B120F7D9-7C1E-4716-B2FA-2990D449F754", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*", "matchCriteriaId": "CD61E49F-2A46-4107-BB3F-527079983306", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*", "matchCriteriaId": "D900AAE0-6032-4096-AFC2-3D43C55C6C83", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*", "matchCriteriaId": "88B0958C-744C-4946-908C-09D2A5FAB120", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*", "matchCriteriaId": "C3E7F3CA-FFB3-42B3-A64F-0E38FAF252FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*", "matchCriteriaId": "9A2D8D09-3F18-4E73-81CF-BB589BB8AEC1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*", "matchCriteriaId": "3FD24779-988F-4EC1-AC19-77186B68229E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*", "matchCriteriaId": "4F1E860E-98F2-48FF-B8B3-54D4B58BF81F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*", "matchCriteriaId": "28BE548B-DD0C-4C58-98CA-5B803F04F9EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*", "matchCriteriaId": "505A8F40-7758-412F-8895-FA1B00BE6B7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*", "matchCriteriaId": "212F4A5F-87E3-4C62-BA21-46CBBCD8D26A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*", "matchCriteriaId": "5C4DFCD2-00A3-4BC7-8842-836CE22C7B39", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*", "matchCriteriaId": "EB3A0C49-3FF9-4CB7-9E01-F771D4925103", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*", "matchCriteriaId": "F7D1BBD4-2F88-4372-B863-BB70753D841B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update25:*:*:*:*:*:*", "matchCriteriaId": "9A75A4C0-6B49-424B-BEC0-0E0AAEF877B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update26:*:*:*:*:*:*", "matchCriteriaId": "03555D1A-9470-4227-B843-E6EF91A6BC55", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*", "matchCriteriaId": "5F8E9AA0-8907-4B1A-86A1-08568195217D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*", "matchCriteriaId": "A337AD31-4566-4A4E-AFF3-7EAECD5C90F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*", "matchCriteriaId": "0754AFDC-2F1C-4C06-AB46-457B5E610029", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*", "matchCriteriaId": "532CF9DD-0EBB-4B3B-BB9C-A8D78947A790", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*", "matchCriteriaId": "DC0ABF7A-107B-4B97-9BD7-7B0CEDAAF359", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*", "matchCriteriaId": "A5DA4242-30D9-44C8-9D0D-877348FFA22B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*", "matchCriteriaId": "C61C6043-99D0-4F36-AF84-1A5F90B895EE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6186321E-5B05-49B5-9200-EA6B5CC3653B", "versionEndIncluding": "1.4.2_29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "002CA86D-3090-4C7A-947A-21CB5D1ADD98", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "6F6453C9-7EE0-4FFB-861D-C2D9416DCABA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*", "matchCriteriaId": "AF4E34FD-D927-42BB-8A16-031D77CB4B9E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "6DDE253E-C8B6-4C1D-AECE-ABEA1A67306B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "A56D9A60-F272-4D4C-A9DD-C93DAF783585", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "EF109CAA-E8D2-4BD7-BE7C-AF8B2A78672E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "976F4ACB-3725-45B7-B2EF-DEE4B88254E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "52BDD6A8-1611-4C3C-865D-6EDB5B9F8D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "6A1F28FF-652A-4C89-9AC6-5E212F890811", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "96A8C351-E9CD-431B-8B9D-712CA54C7213", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "36888382-79C8-4C97-A654-C668CD68556F", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "F34C99E6-F9F0-4EF3-8601-B47EAE3D7273", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "A74DD08D-CEDB-460E-BED5-78F6CAF18BF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "E60560EC-6DBD-4A17-BFFA-FAD9193A0BC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "E4F64FBC-DC97-4FE3-A235-18B87945AF7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "85048406-9051-4E69-94A8-5C449F3B89E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "B1C88DD7-0B46-4405-BD35-60D27E2DBA14", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "08D23B7C-7B8C-41B8-8D94-BB0F27C7F0A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "1C49B997-95D3-4DA4-A353-DB41AD461C5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "6F70EF76-ED5F-4835-8252-FE613604FA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "6BDBCAD8-CDF7-4550-8EA2-1409B02FFAD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "7E691333-0434-4808-9ED4-E82C6EC2FD37", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "BBE7A538-FF2E-4622-8479-781AB73CBA45", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*", "matchCriteriaId": "CD491CD3-5763-4698-8893-2D5F5609BD89", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*", "matchCriteriaId": "ADF4E465-6B0B-4295-81F7-D09ADB81394C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_25:*:*:*:*:*:*:*", "matchCriteriaId": "E79C04F7-E3A1-4DF5-94E9-E96A6FC61FC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_26:*:*:*:*:*:*:*", "matchCriteriaId": "5743F0FD-486D-4787-B53E-CCD220BBCDF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_27:*:*:*:*:*:*:*", "matchCriteriaId": "39847B3A-6DF5-4CED-B89C-18513395B540", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:sdk:1.4.2_28:*:*:*:*:*:*:*", "matchCriteriaId": "649AD6BA-D8CF-4C19-A540-E2266945015F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jre:*:update27:*:*:*:*:*:*", "matchCriteriaId": "4A7E109E-D17D-4396-B1F3-8D9E059BCFFC", "versionEndIncluding": "1.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "133A7B66-E0B3-4867-A5A4-3C54D6C0C8ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*", "matchCriteriaId": "A7FC09E8-7F30-4FE4-912E-588AA250E2A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*", "matchCriteriaId": "A586DE4E-8A46-41DE-9FDB-5FDB81DCC87B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*", "matchCriteriaId": "9919D091-73D7-465A-80FF-F37D6CAF9F46", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*", "matchCriteriaId": "02565D6F-4CB2-4671-A4EF-3169BCFA6154", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*", "matchCriteriaId": "452A3E51-9EAC-451D-BA04-A1E7B7D917EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*", "matchCriteriaId": "3E8C6AAC-C90B-4220-A69B-2A886A35CF5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*", "matchCriteriaId": "55231B6B-9298-4363-9B5A-14C2DA7B1F50", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*", "matchCriteriaId": "E42CF0F7-418C-4BB6-9B73-FA3B9171D092", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*", "matchCriteriaId": "A5467E9D-07D8-4BEB-84D5-A3136C133519", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*", "matchCriteriaId": "B83B2CE1-45D7-47AD-BC0A-6EC74D5F8F5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*", "matchCriteriaId": "8A32F326-EA92-43CD-930E-E527B60CDD3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*", "matchCriteriaId": "7EA5B9E9-654D-44F7-AE98-3D8B382804AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*", "matchCriteriaId": "04344167-530E-4A4D-90EF-74C684943DF1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*", "matchCriteriaId": "B0E0373B-201D-408F-9234-A7EFE8B4970D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*", "matchCriteriaId": "15EAD76D-D5D0-4984-9D07-C1451D791083", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*", "matchCriteriaId": "DE949EBF-2BC0-4355-8B28-B494023D45FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*", "matchCriteriaId": "7E0A0A2D-62B9-4A00-84EF-90C15E47A632", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*", "matchCriteriaId": "A070A282-CBD6-4041-B149-5E310BD12E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*", "matchCriteriaId": "3ECAE71B-C549-4EFB-A509-BFD599F5917A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*", "matchCriteriaId": "44051CFE-D15D-4416-A123-F3E49C67A9E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*", "matchCriteriaId": "F296ACF3-1373-429D-B991-8B5BA704A7EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*", "matchCriteriaId": "B863420B-DE16-416A-9640-1A1340A9B855", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*", "matchCriteriaId": "724C972F-74FE-4044-BBC4-7E0E61FC9002", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*", "matchCriteriaId": "46F41C15-0EF4-4115-BFAA-EEAD56FAEEDB", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*", "matchCriteriaId": "EBE909DE-E55A-4BD3-A5BF-ADE407432193", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*", "matchCriteriaId": "5DAC04D2-68FD-4793-A8E7-4690A543D7D4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1107386-7777-40DF-96FF-11A9A30CABBF", "versionEndIncluding": "1.4.2_29", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "63978872-E797-4F13-B0F9-98CB67D0962A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "matchCriteriaId": "1EEAB662-644A-4D7B-8237-64142CF48724", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "matchCriteriaId": "D9598A49-95F2-42DB-B92C-CD026F739B83", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "matchCriteriaId": "BED1009E-AE60-43A0-A0F5-38526EFCF423", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "matchCriteriaId": "D011585C-0E62-4233-85FA-F29A07D68DA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "matchCriteriaId": "F226D898-F0E8-41D8-BF40-54DE9FB5426D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "matchCriteriaId": "4CB9CCD1-A67D-4800-9EC5-6E1A0B0B76E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "matchCriteriaId": "CE28C283-447A-4F83-B96B-69F96E663C1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "matchCriteriaId": "D102063B-2434-4141-98E7-2DE501AE1728", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "matchCriteriaId": "03B8CD03-CD31-4F4D-BA90-59435578A4F9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "matchCriteriaId": "41A994BF-1F64-480A-8AA5-748DDD0AB68C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "matchCriteriaId": "88519F2D-AD06-4F05-BEDA-A09216F1B481", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "matchCriteriaId": "AC728978-368D-4B36-B149-70473E92BD1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "matchCriteriaId": "FD5187B1-CB86-48E8-A595-9FCFD9822C0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "matchCriteriaId": "6C660DE4-543A-4E9B-825D-CD099D08CBD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "matchCriteriaId": "98C1942E-16C0-4EB2-AB57-43EC6EC9C3A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*", "matchCriteriaId": "318719C9-7B01-4021-B2EF-8341254DFE6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*", "matchCriteriaId": "DB8FA9BA-51CA-4473-9FE1-9A32FB8C8041", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*", "matchCriteriaId": "CC5E64B6-77DA-44BC-B646-AE01041B1830", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*", "matchCriteriaId": "2DA35E80-9E0E-4A26-B631-A61542BE4739", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*", "matchCriteriaId": "7EEB5367-1BB8-4ED3-8C04-ABA6BAA5AD10", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*", "matchCriteriaId": "BED9E7C8-0418-4733-A496-61CCFD638859", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*", "matchCriteriaId": "6566CE32-E042-424A-893B-C8A9E26E2869", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*", "matchCriteriaId": "B760192E-7193-4FEF-8FFA-680AC89D45A9", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*", "matchCriteriaId": "1C020210-8EBA-41D2-BE4A-962CD902857C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_25:*:*:*:*:*:*:*", "matchCriteriaId": "076444F1-543E-4061-9D39-415A1A889F5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_26:*:*:*:*:*:*:*", "matchCriteriaId": "B29C4AA1-30F8-4AA3-A8B5-4125CF9B66F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_27:*:*:*:*:*:*:*", "matchCriteriaId": "45BD257F-4310-44C7-A304-2F174FA93C5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:jre:1.4.2_28:*:*:*:*:*:*:*", "matchCriteriaId": "6A7B39AB-4B2E-40A2-9FB9-0E209DC7F24F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308." }, { "lang": "es", "value": "El m\u00e9todo Double.parseDouble en Java Runtime Environment (JRE) en Oracle Java SE y Java para Business 6 Update 23 y versiones anteriores, 5.0 Update 27 y versiones anteriores y 1.4.2_29 y versiones anteriores, tal como se utiliza en OpenJDK, Apache, JBossweb y otros productos , permite a atacantes remotos provocar una denegaci\u00f3n de servicio a trav\u00e9s de una cadena manipulada que desencadena un bucle infinito de estimaciones durante la conversi\u00f3n a un n\u00famero de coma flotante binario de doble precisi\u00f3n, como se demuestra usando 2.2250738585072012e-308." } ], "id": "CVE-2010-4476", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-17T19:00:01.900", "references": [ { "source": "secalert_us@oracle.com", "url": "http://blog.fortify.com/blog/2011/02/08/Double-Trouble" }, { "source": "secalert_us@oracle.com", "url": "http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html" }, { "source": "secalert_us@oracle.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053926.html" }, { "source": "secalert_us@oracle.com", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053934.html" }, { "source": "secalert_us@oracle.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html" }, { "source": "secalert_us@oracle.com", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html" }, { "source": "secalert_us@oracle.com", "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "source": "secalert_us@oracle.com", "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "source": "secalert_us@oracle.com", "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "source": "secalert_us@oracle.com", "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "source": "secalert_us@oracle.com", "url": "http://marc.info/?l=bugtraq\u0026m=130168502603566\u0026w=2" }, { "source": "secalert_us@oracle.com", "url": "http://marc.info/?l=bugtraq\u0026m=130270785502599\u0026w=2" }, { "source": "secalert_us@oracle.com", "url": "http://marc.info/?l=bugtraq\u0026m=130497132406206\u0026w=2" }, { "source": "secalert_us@oracle.com", "url": "http://marc.info/?l=bugtraq\u0026m=130497185606818\u0026w=2" }, { "source": "secalert_us@oracle.com", "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "source": "secalert_us@oracle.com", "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "source": "secalert_us@oracle.com", "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "source": "secalert_us@oracle.com", "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "source": "secalert_us@oracle.com", "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "source": "secalert_us@oracle.com", "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "source": "secalert_us@oracle.com", "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "source": "secalert_us@oracle.com", "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "source": "secalert_us@oracle.com", "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "source": "secalert_us@oracle.com", "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "source": "secalert_us@oracle.com", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "source": "secalert_us@oracle.com", "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "source": "secalert_us@oracle.com", "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "source": "secalert_us@oracle.com", "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "source": "secalert_us@oracle.com", "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43048" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43280" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43295" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43304" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43333" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43378" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43400" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43659" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/44954" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/45022" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45555" }, { "source": "secalert_us@oracle.com", "url": "http://secunia.com/advisories/49198" }, { "source": "secalert_us@oracle.com", "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "source": "secalert_us@oracle.com", "url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html" }, { "source": "secalert_us@oracle.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ94423" }, { "source": "secalert_us@oracle.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM31983" }, { "source": "secalert_us@oracle.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468358" }, { "source": "secalert_us@oracle.com", "url": "http://www.debian.org/security/2011/dsa-2161" }, { "source": "secalert_us@oracle.com", "url": "http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/" }, { "source": "secalert_us@oracle.com", "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.ibm.com/support/docview.wss?uid=swg24029497" }, { "source": "secalert_us@oracle.com", "url": "http://www.ibm.com/support/docview.wss?uid=swg24029498" }, { "source": "secalert_us@oracle.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:054" }, { "source": "secalert_us@oracle.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html" }, { "source": "secalert_us@oracle.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html" }, { "source": "secalert_us@oracle.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0210.html" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0211.html" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0212.html" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0213.html" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0214.html" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0282.html" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0333.html" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0334.html" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html" }, { "source": "secalert_us@oracle.com", "url": "http://www.securitytracker.com/id?1025062" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0365" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0377" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0379" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0422" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0434" }, { "source": "secalert_us@oracle.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0605" }, { "source": "secalert_us@oracle.com", "url": "http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" }, { "source": "secalert_us@oracle.com", "url": "http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" }, { "source": "secalert_us@oracle.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12662" }, { "source": "secalert_us@oracle.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12745" }, { "source": "secalert_us@oracle.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14328" }, { "source": "secalert_us@oracle.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14589" }, { "source": "secalert_us@oracle.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19493" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://blog.fortify.com/blog/2011/02/08/Double-Trouble" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053926.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053934.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=130168502603566\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=130270785502599\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=130497132406206\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=130497185606818\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43048" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43280" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43295" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43304" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43333" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43378" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43400" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43659" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44954" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/45022" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45555" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/49198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ94423" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM31983" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468358" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2011/dsa-2161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ibm.com/support/docview.wss?uid=swg24029497" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ibm.com/support/docview.wss?uid=swg24029498" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:054" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0210.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0211.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0212.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0213.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0214.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0282.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0333.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0334.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1025062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0365" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0377" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0379" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0422" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0434" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0605" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12662" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12745" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14328" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14589" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19493" } ], "sourceIdentifier": "secalert_us@oracle.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2010-4476
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2010-4476", "description": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "id": "GSD-2010-4476", "references": [ "https://www.suse.com/security/cve/CVE-2010-4476.html", "https://www.debian.org/security/2011/dsa-2161", "https://access.redhat.com/errata/RHSA-2011:0880", "https://access.redhat.com/errata/RHSA-2011:0350", "https://access.redhat.com/errata/RHSA-2011:0349", "https://access.redhat.com/errata/RHSA-2011:0348", "https://access.redhat.com/errata/RHSA-2011:0336", "https://access.redhat.com/errata/RHSA-2011:0335", "https://access.redhat.com/errata/RHSA-2011:0334", "https://access.redhat.com/errata/RHSA-2011:0333", "https://access.redhat.com/errata/RHSA-2011:0299", "https://access.redhat.com/errata/RHSA-2011:0292", "https://access.redhat.com/errata/RHSA-2011:0291", "https://access.redhat.com/errata/RHSA-2011:0290", "https://access.redhat.com/errata/RHSA-2011:0282", "https://access.redhat.com/errata/RHSA-2011:0214", "https://access.redhat.com/errata/RHSA-2011:0213", "https://access.redhat.com/errata/RHSA-2011:0212", "https://access.redhat.com/errata/RHSA-2011:0211", "https://access.redhat.com/errata/RHSA-2011:0210", "https://linux.oracle.com/cve/CVE-2010-4476.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2010-4476" ], "details": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.", "id": "GSD-2010-4476", "modified": "2023-12-13T01:21:30.370055Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2010-4476", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "43295", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43295" }, { "name": "1025062", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1025062" }, { "name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html", "refsource": "CONFIRM", "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html" }, { "name": "43280", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43280" }, { "name": "RHSA-2011:0210", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0210.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html" }, { "name": "GLSA-201406-32", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "oval:org.mitre.oval:def:14328", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14328" }, { "name": "HPSBMU02799", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" }, { "name": "FEDORA-2011-1231", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053926.html" }, { "name": "FEDORA-2011-1263", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053934.html" }, { "name": "SUSE-SU-2011:0823", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html" }, { "name": "HPSBNS02633", "refsource": "HP", "url": "http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" }, { "name": "SSRT100387", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "name": "HPSBUX02860", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "name": "RHSA-2011:0214", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0214.html" }, { "name": "PM31983", "refsource": "AIXAPAR", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM31983" }, { "name": "45555", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/45555" }, { "name": "IZ94423", "refsource": "AIXAPAR", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ94423" }, { "name": "43400", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43400" }, { "name": "SSRT100412", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "name": "HPSBMA02642", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "name": "43378", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43378" }, { "name": "45022", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/45022" }, { "name": "RHSA-2011:0333", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0333.html" }, { "name": "ADV-2011-0422", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0422" }, { "name": "oval:org.mitre.oval:def:12662", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12662" }, { "name": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html" }, { "name": "HPSBMU02690", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "name": "ADV-2011-0434", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0434" }, { "name": "HPSBUX02633", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "name": "HPSBOV02762", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "name": "oval:org.mitre.oval:def:14589", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14589" }, { "name": "HPSBUX02641", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "name": "RHSA-2011:0213", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0213.html" }, { "name": "SSRT100627", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "name": "http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/", "refsource": "MISC", "url": "http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/" }, { "name": "ADV-2011-0377", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0377" }, { "name": "44954", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/44954" }, { "name": "HPSBOV02634", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130497132406206\u0026w=2" }, { "name": "ADV-2011-0365", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0365" }, { "name": "SSRT100415", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "name": "http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html", "refsource": "CONFIRM", "url": "http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html" }, { "name": "RHSA-2011:0880", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html" }, { "name": "oval:org.mitre.oval:def:12745", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12745" }, { "name": "RHSA-2011:0334", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0334.html" }, { "name": "RHSA-2011:0282", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0282.html" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21468358", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468358" }, { "name": "43048", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43048" }, { "name": "DSA-2161", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2011/dsa-2161" }, { "name": "SSRT100825", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "name": "ADV-2011-0379", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0379" }, { "name": "43304", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43304" }, { "name": "RHSA-2011:0211", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0211.html" }, { "name": "SSRT100390", "refsource": "HP", "url": "http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" }, { "name": "SSRT100867", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "name": "49198", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/49198" }, { "name": "43659", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43659" }, { "name": "http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg24029498", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg24029498" }, { "name": "HPSBUX02725", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "name": "SUSE-SA:2011:024", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html" }, { "name": "HPSBUX02777", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "oval:org.mitre.oval:def:19493", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19493" }, { "name": "43333", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/43333" }, { "name": "SSRT101146", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "name": "SSRT100569", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "name": "HPSBUX02645", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130168502603566\u0026w=2" }, { "name": "RHSA-2011:0212", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2011-0212.html" }, { "name": "HPSBUX02642", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130270785502599\u0026w=2" }, { "name": "SSRT100854", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html", "refsource": "CONFIRM", "url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html" }, { "name": "ADV-2011-0605", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2011/0605" }, { "name": "http://blog.fortify.com/blog/2011/02/08/Double-Trouble", "refsource": "MISC", "url": "http://blog.fortify.com/blog/2011/02/08/Double-Trouble" }, { "name": "HPSBTU02684", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=130497185606818\u0026w=2" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg24029497", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg24029497" }, { "name": "MDVSA-2011:054", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:054" }, { "name": "HPSBMU02797", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_21:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_22:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_17:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_19:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_18:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:*:update_23:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.6.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.6.0:update_1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_21:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_22:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:*:update_23:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.6.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_19:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_17:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update1_b06:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_18:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update_11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.6.0:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update22:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update23:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update19:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update21:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update17:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update18:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update26:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:*:update27:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update24:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jdk:1.5.0:update25:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:1.4.2_28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:sdk:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.4.2_29", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update4:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update12:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update13:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update20:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update21:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update10:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update11:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update18:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update19:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update26:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:*:update27:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.5.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update7:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update8:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update9:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update17:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update24:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update25:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update14:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update15:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update22:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.5.0:update23:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_28:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "1.4.2_29", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_25:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_26:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:jre:1.4.2_27:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert_us@oracle.com", "ID": "CVE-2010-4476" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/javacpufeb2011-304611.html" }, { "name": "RHSA-2011:0214", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0214.html" }, { "name": "PM31983", "refsource": "AIXAPAR", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM31983" }, { "name": "FEDORA-2011-1231", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053926.html" }, { "name": "DSA-2161", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2011/dsa-2161" }, { "name": "RHSA-2011:0282", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0282.html" }, { "name": "43400", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43400" }, { "name": "ADV-2011-0422", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0422" }, { "name": "RHSA-2011:0211", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0211.html" }, { "name": "IZ94423", "refsource": "AIXAPAR", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg1IZ94423" }, { "name": "ADV-2011-0434", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0434" }, { "name": "RHSA-2011:0213", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0213.html" }, { "name": "43280", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43280" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21468358", "refsource": "CONFIRM", "tags": [], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21468358" }, { "name": "FEDORA-2011-1263", "refsource": "FEDORA", "tags": [], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-February/053934.html" }, { "name": "HPSBNS02633", "refsource": "HP", "tags": [], "url": "http://www13.itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02720715\u0026admit=109447627+1298159618320+28353475" }, { "name": "ADV-2011-0365", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0365" }, { "name": "43378", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43378" }, { "name": "43304", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43304" }, { "name": "43295", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43295" }, { "name": "ADV-2011-0379", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0379" }, { "name": "RHSA-2011:0212", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0212.html" }, { "name": "http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html", "refsource": "CONFIRM", "tags": [], "url": "http://blogs.oracle.com/security/2011/02/security_alert_for_cve-2010-44.html" }, { "name": "1025062", "refsource": "SECTRACK", "tags": [], "url": "http://www.securitytracker.com/id?1025062" }, { "name": "ADV-2011-0377", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0377" }, { "name": "RHSA-2011:0210", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0210.html" }, { "name": "http://blog.fortify.com/blog/2011/02/08/Double-Trouble", "refsource": "MISC", "tags": [], "url": "http://blog.fortify.com/blog/2011/02/08/Double-Trouble" }, { "name": "43048", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43048" }, { "name": "43333", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43333" }, { "name": "http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/alert-cve-2010-4476-305811.html" }, { "name": "http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/", "refsource": "MISC", "tags": [], "url": "http://www.exploringbinary.com/java-hangs-when-converting-2-2250738585072012e-308/" }, { "name": "RHSA-2011:0334", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0334.html" }, { "name": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html", "refsource": "CONFIRM", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html" }, { "name": "RHSA-2011:0333", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0333.html" }, { "name": "45555", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/45555" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg24029498", "refsource": "CONFIRM", "tags": [], "url": "http://www.ibm.com/support/docview.wss?uid=swg24029498" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg24029497", "refsource": "CONFIRM", "tags": [], "url": "http://www.ibm.com/support/docview.wss?uid=swg24029497" }, { "name": "RHSA-2011:0880", "refsource": "REDHAT", "tags": [ "Vendor Advisory" ], "url": "http://www.redhat.com/support/errata/RHSA-2011-0880.html" }, { "name": "HPSBMA02642", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=130514352726432\u0026w=2" }, { "name": "MDVSA-2011:054", "refsource": "MANDRIVA", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:054" }, { "name": "HPSBMU02690", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=131041767210772\u0026w=2" }, { "name": "ADV-2011-0605", "refsource": "VUPEN", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2011/0605" }, { "name": "SSRT100412", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=129960314701922\u0026w=2" }, { "name": "SUSE-SA:2011:024", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00004.html" }, { "name": "SUSE-SU-2011:0823", "refsource": "SUSE", "tags": [], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-07/msg00010.html" }, { "name": "43659", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/43659" }, { "name": "44954", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/44954" }, { "name": "45022", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/45022" }, { "name": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html", "refsource": "CONFIRM", "tags": [], "url": "http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5098550.html" }, { "name": "49198", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/49198" }, { "name": "SSRT100627", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=132215163318824\u0026w=2" }, { "name": "HPSBUX02860", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=136485229118404\u0026w=2" }, { "name": "GLSA-201406-32", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-201406-32.xml" }, { "name": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html", "refsource": "CONFIRM", "tags": [], "url": "http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS11-003/index.html" }, { "name": "SSRT100867", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=134254957702612\u0026w=2" }, { "name": "HPSBUX02642", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=130270785502599\u0026w=2" }, { "name": "HPSBTU02684", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=130497185606818\u0026w=2" }, { "name": "HPSBOV02762", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=133469267822771\u0026w=2" }, { "name": "HPSBOV02634", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=130497132406206\u0026w=2" }, { "name": "SSRT100387", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=129899347607632\u0026w=2" }, { "name": "HPSBUX02777", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=133728004526190\u0026w=2" }, { "name": "HPSBUX02645", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=130168502603566\u0026w=2" }, { "name": "oval:org.mitre.oval:def:19493", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19493" }, { "name": "oval:org.mitre.oval:def:14589", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14589" }, { "name": "oval:org.mitre.oval:def:14328", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14328" }, { "name": "oval:org.mitre.oval:def:12745", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12745" }, { "name": "oval:org.mitre.oval:def:12662", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12662" }, { "name": "HPSBMU02799", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=134254866602253\u0026w=2" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-30T16:26Z", "publishedDate": "2011-02-17T19:00Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…