CVE-2009-1099
Publication date 25 March 2009
Last updated 24 July 2024
Ubuntu priority
Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via crafted glyph descriptions in a Type1 font, which bypasses a signed comparison and triggers a buffer overflow.
Status
Package | Ubuntu Release | Status |
---|---|---|
openjdk-6 | 10.04 LTS lucid |
Not affected
|
9.10 karmic |
Not affected
|
|
9.04 jaunty |
Not affected
|
|
8.10 intrepid |
Not affected
|
|
8.04 LTS hardy |
Not affected
|
|
7.10 gutsy | Not in release | |
6.06 LTS dapper | Not in release | |
sun-java5 | 10.04 LTS lucid | Not in release |
9.10 karmic | Not in release | |
9.04 jaunty |
Not affected
|
|
8.10 intrepid | Ignored end of life, was needs-triage | |
8.04 LTS hardy |
Not affected
|
|
7.10 gutsy | Ignored end of life, was needs-triage | |
6.06 LTS dapper | Ignored end of life | |
sun-java6 | 10.04 LTS lucid |
Fixed 6.20dlj-1ubuntu3
|
9.10 karmic |
Fixed 6.20dlj-0ubuntu1.9.10
|
|
9.04 jaunty |
Fixed 6.20dlj-0ubuntu1.9.04
|
|
8.10 intrepid | Ignored end of life, was needs-triage | |
8.04 LTS hardy |
Fixed 6.20dlj-0ubuntu1.8.04
|
|
7.10 gutsy | Ignored end of life, was needs-triage | |
6.06 LTS dapper | Not in release |
Notes
kees
RedHat lists this as “OpenJDK: Type1 font processing buffer overflow vulnerability” and bug 492302. Sun’s bug seems to be 6804999, from http://sunsolve.sun.com/search/document.do?assetkey=1-26-254571-1