jdk-1.6.0_43
エラータID: AXSA:2013-174:03
リリース日:
2013/03/12 Tuesday - 14:31
題名:
jdk-1.6.0_43
影響のあるチャネル:
Asianux Server 3 for x86_64
Asianux Server 3 for x86
Severity:
High
Description:
バグフィックスが施された jdk-1.6.0_43 がリリースされました。
詳細については、以下の URL を参照してください。
http://www.oracle.com/technetwork/java/javase/6u43-relnotes-1915290.html
解決策:
1. 以下の URL から JDK 6 Update 43 をダウンロードしてください。
http://www.oracle.com/technetwork/java/javase/downloads/jdk6downloads-19...
[Asianux Server 3]
jdk-6u43-linux-i586-rpm.bin
[Asianux Server 3 for x86-64]
jdk-6u43-linux-x64-rpm.bin
2. 以下のコマンドを実行してインストールしてください。
[Asianux Server 3]
# sh jdk-6u43-linux-i586-rpm.bin
[Asianux Server 3 for x86-64]
# sh jdk-6u43-linux-x64-rpm.bin
CVE:
CVE-2013-0809
Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2013-1493.
Unspecified vulnerability in the 2D component in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code via unknown vectors, a different vulnerability than CVE-2013-1493.
CVE-2013-1493
The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.
The color management (CMM) functionality in the 2D component in Oracle Java SE 7 Update 15 and earlier, 6 Update 41 and earlier, and 5.0 Update 40 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (crash) via an image with crafted raster parameters, which triggers (1) an out-of-bounds read or (2) memory corruption in the JVM, as exploited in the wild in February 2013.
追加情報:
N/A
ダウンロード: