SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Oracle Java SE Vendors:   Sun
(Red Hat Issues Fix) Java Runtime Environment Buffer Overflows Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1017595
SecurityTracker URL:  http://securitytracker.com/id/1017595
CVE Reference:   CVE-2006-6731   (Links to External Site)
Date:  Feb 7 2007
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 5.0 Update 7 and prior versions
Description:   A vulnerability was reported in Java Runtime Environment (JRE). A remote user can execute arbitrary code on the target system.

A remote user can create a specially crafted Java applet that, when loaded by the target user, will trigger buffer overflows and gain elevated privileges or execute arbitrary code on the target system.

Sun credits Chris Evans with reporting these vulnerabilities.

The original advisory is available at:

http://scary.beasts.org/security/CESA-2005-008.txt

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   Red Hat has released a fix.

The Red Hat advisory is available at:

https://rhn.redhat.com/errata/RHSA-2007-0062.html

Vendor URL:  sunsolve.sun.com/search/document.do?assetkey=1-26-102729-1 (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Red Hat Enterprise)
Underlying OS Comments:  3, 4

Message History:   This archive entry is a follow-up to the message listed below.
Dec 20 2006 Java Runtime Environment Buffer Overflows Let Remote Users Execute Arbitrary Code



 Source Message Contents

Subject:  [RHSA-2007:0062-02] Critical: java-1.4.2-ibm security update


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ---------------------------------------------------------------------
                   Red Hat Security Advisory

Synopsis:          Critical: java-1.4.2-ibm security update
Advisory ID:       RHSA-2007:0062-02
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2007-0062.html
Issue date:        2007-02-07
Updated on:        2007-02-07
Product:           Red Hat Enterprise Linux Extras
CVE Names:         CVE-2006-4339 CVE-2006-6731 CVE-2006-6736 
                   CVE-2006-6737 CVE-2006-6745 
- ---------------------------------------------------------------------

1. Summary:

Updated java-1.4.2-ibm packages to correct several security issues are now
available for Red Hat Enterprise Linux 3 and 4 Extras.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AS version 3 Extras - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 3 Extras - i386, x86_64
Red Hat Enterprise Linux ES version 3 Extras - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 3 Extras - i386, ia64, x86_64
Red Hat Enterprise Linux AS version 4 Extras - i386, ia64, ppc, s390, s390x, x86_64
Red Hat Desktop version 4 Extras - i386, x86_64
Red Hat Enterprise Linux ES version 4 Extras - i386, ia64, x86_64
Red Hat Enterprise Linux WS version 4 Extras - i386, ia64, x86_64

3. Problem description:

IBM's 1.4.2 SR7 Java release includes the IBM Java 2 Runtime Environment
and the IBM Java 2 Software Development Kit.

A number of security issues were found:

Vulnerabilities were discovered in the Java Runtime Environment.   An
untrusted applet could use these vulnerabilities to access data from other
applets. (CVE-2006-6736, CVE-2006-6737)

Serialization flaws were discovered in the Java Runtime Environment.  An
untrusted applet or application could use these flaws to elevate its
privileges.  (CVE-2006-6745)

Buffer overflow vulnerabilities were discovered in the Java Runtime
Environment.  An untrusted applet could use these flaws to elevate its
privileges, possibly reading and writing local files or executing local
applications.  (CVE-2006-6731)

Daniel Bleichenbacher discovered an attack on PKCS #1 v1.5 signatures.
Where an RSA key with exponent 3 is used it may be possible for an attacker
to forge a PKCS #1 v1.5 signature that would be incorrectly verified by
implementations that do not check for excess data in the RSA exponentiation
result of the signature.  (CVE-2006-4339)

All users of java-1.4.2-ibm should upgrade to these updated packages, which
contain IBM's 1.4.2 SR7 Java release which resolves these issues.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade.  Only those
RPMs which are currently installed will be updated.  Those RPMs which are
not installed but included in the list will not be updated.  Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network.  Many
people find this an easier way to apply updates.  To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

5. Bug IDs fixed (http://bugzilla.redhat.com/):

226981 - CVE-2006-6736 Multiple JRE flaws (CVE-2006-6737 CVE-2006-6745 CVE-2006-6731 CVE-2006-4339)
226984 - CVE-2006-6736 Multiple JRE flaws (CVE-2006-6737 CVE-2006-6745 CVE-2006-6731 CVE-2006-4339)

6. RPMs required:

Red Hat Enterprise Linux AS version 3 Extras:

i386:
e7450b145da72cd7df3d7b9eabb672dc  java-1.4.2-ibm-1.4.2.7-1jpp.4.el3.i386.rpm
a0658fd7cf3543965f2b6a3ff7a675ae  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el3.i386.rpm
32f05440f20c1f7a45736beba22d7bd2  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el3.i386.rpm
8c664c87d87efd40e937b9ad2ae659d5  java-1.4.2-ibm-jdbc-1.4.2.7-1jpp.4.el3.i386.rpm
9174b55fd33680c3eaa09c2def109753  java-1.4.2-ibm-plugin-1.4.2.7-1jpp.4.el3.i386.rpm
395153b4b890249469b8e1f18673f66d  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el3.i386.rpm

ia64:
9571ca41f69035894760e4e9e6de61a1  java-1.4.2-ibm-1.4.2.7-1jpp.4.el3.ia64.rpm
6cce9e4c37e6bc1b52e2201bad040ac0  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el3.ia64.rpm
e0dd38c2639885d1ccf964cf4e045289  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el3.ia64.rpm
6e859d8ca4885c93cf08ff4d22e10b0f  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el3.ia64.rpm

ppc:
69ded60046e91ba9348ccff2e52ebf17  java-1.4.2-ibm-1.4.2.7-1jpp.4.el3.ppc.rpm
550284dbfa734add72eca30901d83c1f  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el3.ppc.rpm
9aa5ee3ec845826d39af26f6883f3a1b  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el3.ppc.rpm
244ca4300d6836baedda66db772fc496  java-1.4.2-ibm-jdbc-1.4.2.7-1jpp.4.el3.ppc.rpm
c73781419d273f37f97d8ce82b311e06  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el3.ppc.rpm

s390:
75cd8c41222044a08be04ee95cac3a69  java-1.4.2-ibm-1.4.2.7-1jpp.4.el3.s390.rpm
d9515b48f0e376124b95f863a0e119b1  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el3.s390.rpm
7ab30161aa45ba80855b0d2e076d26c7  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el3.s390.rpm
9e6b279d59ca128a8dbd13d3d606c9fe  java-1.4.2-ibm-jdbc-1.4.2.7-1jpp.4.el3.s390.rpm
a4bb1c49be860aab8e93b19a8176ff6c  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el3.s390.rpm

s390x:
12c5031365228f5f19eee8a215ef9ee4  java-1.4.2-ibm-1.4.2.7-1jpp.4.el3.s390x.rpm
8409692fe20686679d58f612d717e40a  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el3.s390x.rpm
d2d32c3276a9c00ac4734a2a8f1ffb96  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el3.s390x.rpm
8a16cefe0fbb4f8247759f09cdcf6785  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el3.s390x.rpm

x86_64:
82547c355444694fd0b2b8dbb6287a12  java-1.4.2-ibm-1.4.2.7-1jpp.4.el3.x86_64.rpm
0d47bf67675dfee8814d9f5cbd430f35  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el3.x86_64.rpm
120deecf68b62f7263bcebbd65c6bd89  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el3.x86_64.rpm
7be9dc42fac394d88d3b0692e8b55d88  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el3.x86_64.rpm

Red Hat Desktop version 3 Extras:

i386:
e7450b145da72cd7df3d7b9eabb672dc  java-1.4.2-ibm-1.4.2.7-1jpp.4.el3.i386.rpm
a0658fd7cf3543965f2b6a3ff7a675ae  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el3.i386.rpm
32f05440f20c1f7a45736beba22d7bd2  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el3.i386.rpm
8c664c87d87efd40e937b9ad2ae659d5  java-1.4.2-ibm-jdbc-1.4.2.7-1jpp.4.el3.i386.rpm
9174b55fd33680c3eaa09c2def109753  java-1.4.2-ibm-plugin-1.4.2.7-1jpp.4.el3.i386.rpm
395153b4b890249469b8e1f18673f66d  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el3.i386.rpm

x86_64:
82547c355444694fd0b2b8dbb6287a12  java-1.4.2-ibm-1.4.2.7-1jpp.4.el3.x86_64.rpm
0d47bf67675dfee8814d9f5cbd430f35  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el3.x86_64.rpm
120deecf68b62f7263bcebbd65c6bd89  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el3.x86_64.rpm
7be9dc42fac394d88d3b0692e8b55d88  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el3.x86_64.rpm

Red Hat Enterprise Linux ES version 3 Extras:

i386:
e7450b145da72cd7df3d7b9eabb672dc  java-1.4.2-ibm-1.4.2.7-1jpp.4.el3.i386.rpm
a0658fd7cf3543965f2b6a3ff7a675ae  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el3.i386.rpm
32f05440f20c1f7a45736beba22d7bd2  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el3.i386.rpm
8c664c87d87efd40e937b9ad2ae659d5  java-1.4.2-ibm-jdbc-1.4.2.7-1jpp.4.el3.i386.rpm
9174b55fd33680c3eaa09c2def109753  java-1.4.2-ibm-plugin-1.4.2.7-1jpp.4.el3.i386.rpm
395153b4b890249469b8e1f18673f66d  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el3.i386.rpm

ia64:
9571ca41f69035894760e4e9e6de61a1  java-1.4.2-ibm-1.4.2.7-1jpp.4.el3.ia64.rpm
6cce9e4c37e6bc1b52e2201bad040ac0  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el3.ia64.rpm
e0dd38c2639885d1ccf964cf4e045289  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el3.ia64.rpm
6e859d8ca4885c93cf08ff4d22e10b0f  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el3.ia64.rpm

x86_64:
82547c355444694fd0b2b8dbb6287a12  java-1.4.2-ibm-1.4.2.7-1jpp.4.el3.x86_64.rpm
0d47bf67675dfee8814d9f5cbd430f35  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el3.x86_64.rpm
120deecf68b62f7263bcebbd65c6bd89  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el3.x86_64.rpm
7be9dc42fac394d88d3b0692e8b55d88  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el3.x86_64.rpm

Red Hat Enterprise Linux WS version 3 Extras:

i386:
e7450b145da72cd7df3d7b9eabb672dc  java-1.4.2-ibm-1.4.2.7-1jpp.4.el3.i386.rpm
a0658fd7cf3543965f2b6a3ff7a675ae  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el3.i386.rpm
32f05440f20c1f7a45736beba22d7bd2  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el3.i386.rpm
8c664c87d87efd40e937b9ad2ae659d5  java-1.4.2-ibm-jdbc-1.4.2.7-1jpp.4.el3.i386.rpm
9174b55fd33680c3eaa09c2def109753  java-1.4.2-ibm-plugin-1.4.2.7-1jpp.4.el3.i386.rpm
395153b4b890249469b8e1f18673f66d  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el3.i386.rpm

ia64:
9571ca41f69035894760e4e9e6de61a1  java-1.4.2-ibm-1.4.2.7-1jpp.4.el3.ia64.rpm
6cce9e4c37e6bc1b52e2201bad040ac0  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el3.ia64.rpm
e0dd38c2639885d1ccf964cf4e045289  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el3.ia64.rpm
6e859d8ca4885c93cf08ff4d22e10b0f  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el3.ia64.rpm

x86_64:
82547c355444694fd0b2b8dbb6287a12  java-1.4.2-ibm-1.4.2.7-1jpp.4.el3.x86_64.rpm
0d47bf67675dfee8814d9f5cbd430f35  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el3.x86_64.rpm
120deecf68b62f7263bcebbd65c6bd89  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el3.x86_64.rpm
7be9dc42fac394d88d3b0692e8b55d88  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el3.x86_64.rpm

Red Hat Enterprise Linux AS version 4 Extras:

i386:
b7264df6d752971972379c417acdd542  java-1.4.2-ibm-1.4.2.7-1jpp.4.el4.i386.rpm
c74450baebca6f946e30e75f38675e15  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el4.i386.rpm
5e28c4902e574860651c603b26f8e437  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el4.i386.rpm
130198d2be48375779e309cd7aa9ddcd  java-1.4.2-ibm-javacomm-1.4.2.7-1jpp.4.el4.i386.rpm
76f4fe9ec6e40c550d04ba215b56649a  java-1.4.2-ibm-jdbc-1.4.2.7-1jpp.4.el4.i386.rpm
06f53b5223f6cb0989eb6d2c1c709ace  java-1.4.2-ibm-plugin-1.4.2.7-1jpp.4.el4.i386.rpm
3937cebe4d2430437d8376c071ff3f6e  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el4.i386.rpm

ia64:
91095470fd69f0f9d7632236120e7d0a  java-1.4.2-ibm-1.4.2.7-1jpp.4.el4.ia64.rpm
971f88fbd24d4bc41f20291aa4386347  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el4.ia64.rpm
40425175a220f0f780eb5dca44dfa55e  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el4.ia64.rpm
753c21317025a630423d2c205968c1ea  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el4.ia64.rpm

ppc:
d6df0373e049ef2b4603b7ae51d133a3  java-1.4.2-ibm-1.4.2.7-1jpp.4.el4.ppc.rpm
b2c6b236dafbb63472bd3fce88593fb6  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el4.ppc.rpm
09c905c7b0997db62830bc2cb0c087f4  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el4.ppc.rpm
2d75e1570dcf7d9bd40ade448a652583  java-1.4.2-ibm-javacomm-1.4.2.7-1jpp.4.el4.ppc.rpm
c0a9a08712bc162e66ecd4c21962c083  java-1.4.2-ibm-jdbc-1.4.2.7-1jpp.4.el4.ppc.rpm
6fb51c79625fc5e7d2e0657211dc372c  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el4.ppc.rpm

s390:
1047e8cd790022fb4d4a9e4e51689d89  java-1.4.2-ibm-1.4.2.7-1jpp.4.el4.s390.rpm
cbf3ee99f0d886ee7b286bfc327fa33e  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el4.s390.rpm
f5bd779019897c4d7acaca6db3ec3ddf  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el4.s390.rpm
e85b10f20043b11acc4143dfb23da242  java-1.4.2-ibm-jdbc-1.4.2.7-1jpp.4.el4.s390.rpm
9f86a4f4e4a7d0a774e3e720c2a3ebfb  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el4.s390.rpm

s390x:
c5d86501250a1bc8626b1a9840f2ef0a  java-1.4.2-ibm-1.4.2.7-1jpp.4.el4.s390x.rpm
d900d6335508f7ec99262ad8e76b35dc  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el4.s390x.rpm
5e0d2f22106c6737eba6ebed99ed63b4  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el4.s390x.rpm
c5f5a4b28adf551cffc4a3872b65420c  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el4.s390x.rpm

x86_64:
e0efba6fedf580dc163d3363f1f58f9d  java-1.4.2-ibm-1.4.2.7-1jpp.4.el4.x86_64.rpm
7d2ea6f7b85d9b6679418735388463bd  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el4.x86_64.rpm
04ca69cd86facb7e6da94dca5f7c4741  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el4.x86_64.rpm
6686e763dbe66aa089d9f5952af474af  java-1.4.2-ibm-javacomm-1.4.2.7-1jpp.4.el4.x86_64.rpm
e6ac211159748fac80c30ea6838b769a  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el4.x86_64.rpm

Red Hat Desktop version 4 Extras:

i386:
b7264df6d752971972379c417acdd542  java-1.4.2-ibm-1.4.2.7-1jpp.4.el4.i386.rpm
c74450baebca6f946e30e75f38675e15  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el4.i386.rpm
5e28c4902e574860651c603b26f8e437  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el4.i386.rpm
130198d2be48375779e309cd7aa9ddcd  java-1.4.2-ibm-javacomm-1.4.2.7-1jpp.4.el4.i386.rpm
76f4fe9ec6e40c550d04ba215b56649a  java-1.4.2-ibm-jdbc-1.4.2.7-1jpp.4.el4.i386.rpm
06f53b5223f6cb0989eb6d2c1c709ace  java-1.4.2-ibm-plugin-1.4.2.7-1jpp.4.el4.i386.rpm
3937cebe4d2430437d8376c071ff3f6e  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el4.i386.rpm

x86_64:
e0efba6fedf580dc163d3363f1f58f9d  java-1.4.2-ibm-1.4.2.7-1jpp.4.el4.x86_64.rpm
7d2ea6f7b85d9b6679418735388463bd  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el4.x86_64.rpm
04ca69cd86facb7e6da94dca5f7c4741  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el4.x86_64.rpm
6686e763dbe66aa089d9f5952af474af  java-1.4.2-ibm-javacomm-1.4.2.7-1jpp.4.el4.x86_64.rpm
e6ac211159748fac80c30ea6838b769a  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el4.x86_64.rpm

Red Hat Enterprise Linux ES version 4 Extras:

i386:
b7264df6d752971972379c417acdd542  java-1.4.2-ibm-1.4.2.7-1jpp.4.el4.i386.rpm
c74450baebca6f946e30e75f38675e15  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el4.i386.rpm
5e28c4902e574860651c603b26f8e437  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el4.i386.rpm
130198d2be48375779e309cd7aa9ddcd  java-1.4.2-ibm-javacomm-1.4.2.7-1jpp.4.el4.i386.rpm
76f4fe9ec6e40c550d04ba215b56649a  java-1.4.2-ibm-jdbc-1.4.2.7-1jpp.4.el4.i386.rpm
06f53b5223f6cb0989eb6d2c1c709ace  java-1.4.2-ibm-plugin-1.4.2.7-1jpp.4.el4.i386.rpm
3937cebe4d2430437d8376c071ff3f6e  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el4.i386.rpm

ia64:
91095470fd69f0f9d7632236120e7d0a  java-1.4.2-ibm-1.4.2.7-1jpp.4.el4.ia64.rpm
971f88fbd24d4bc41f20291aa4386347  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el4.ia64.rpm
40425175a220f0f780eb5dca44dfa55e  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el4.ia64.rpm
753c21317025a630423d2c205968c1ea  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el4.ia64.rpm

x86_64:
e0efba6fedf580dc163d3363f1f58f9d  java-1.4.2-ibm-1.4.2.7-1jpp.4.el4.x86_64.rpm
7d2ea6f7b85d9b6679418735388463bd  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el4.x86_64.rpm
04ca69cd86facb7e6da94dca5f7c4741  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el4.x86_64.rpm
6686e763dbe66aa089d9f5952af474af  java-1.4.2-ibm-javacomm-1.4.2.7-1jpp.4.el4.x86_64.rpm
e6ac211159748fac80c30ea6838b769a  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el4.x86_64.rpm

Red Hat Enterprise Linux WS version 4 Extras:

i386:
b7264df6d752971972379c417acdd542  java-1.4.2-ibm-1.4.2.7-1jpp.4.el4.i386.rpm
c74450baebca6f946e30e75f38675e15  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el4.i386.rpm
5e28c4902e574860651c603b26f8e437  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el4.i386.rpm
130198d2be48375779e309cd7aa9ddcd  java-1.4.2-ibm-javacomm-1.4.2.7-1jpp.4.el4.i386.rpm
76f4fe9ec6e40c550d04ba215b56649a  java-1.4.2-ibm-jdbc-1.4.2.7-1jpp.4.el4.i386.rpm
06f53b5223f6cb0989eb6d2c1c709ace  java-1.4.2-ibm-plugin-1.4.2.7-1jpp.4.el4.i386.rpm
3937cebe4d2430437d8376c071ff3f6e  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el4.i386.rpm

ia64:
91095470fd69f0f9d7632236120e7d0a  java-1.4.2-ibm-1.4.2.7-1jpp.4.el4.ia64.rpm
971f88fbd24d4bc41f20291aa4386347  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el4.ia64.rpm
40425175a220f0f780eb5dca44dfa55e  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el4.ia64.rpm
753c21317025a630423d2c205968c1ea  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el4.ia64.rpm

x86_64:
e0efba6fedf580dc163d3363f1f58f9d  java-1.4.2-ibm-1.4.2.7-1jpp.4.el4.x86_64.rpm
7d2ea6f7b85d9b6679418735388463bd  java-1.4.2-ibm-demo-1.4.2.7-1jpp.4.el4.x86_64.rpm
04ca69cd86facb7e6da94dca5f7c4741  java-1.4.2-ibm-devel-1.4.2.7-1jpp.4.el4.x86_64.rpm
6686e763dbe66aa089d9f5952af474af  java-1.4.2-ibm-javacomm-1.4.2.7-1jpp.4.el4.x86_64.rpm
e6ac211159748fac80c30ea6838b769a  java-1.4.2-ibm-src-1.4.2.7-1jpp.4.el4.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and 
details on how to verify the signature are available from
https://www.redhat.com/security/team/key/#package

7. References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-4339
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6731
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6736
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6737
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6745
http://www-128.ibm.com/developerworks/java/jdk/alerts/
http://www.redhat.com/security/updates/classification/#critical

8. Contact:

The Red Hat security contact is <secalert@redhat.com>.  More contact
details at https://www.redhat.com/security/team/contact/

Copyright 2007 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.4 (GNU/Linux)

iD8DBQFFyi+8XlSAg2UNWIIRAqxmAJ9kUQbmruGzvYg2ETmG7UpixwOqfACgwsU5
OaUT+XxVODUOQakqcyikbH4=
=t+i5
-----END PGP SIGNATURE-----



-- 
Enterprise-watch-list mailing list
Enterprise-watch-list@redhat.com
https://www.redhat.com/mailman/listinfo/enterprise-watch-list

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2022, SecurityGlobal.net LLC