CVE-2009-1099

Publication date 25 March 2009

Last updated 24 July 2024


Ubuntu priority

Integer signedness error in Java SE Development Kit (JDK) and Java Runtime Environment (JRE) 5.0 Update 17 and earlier, and 6 Update 12 and earlier, allows remote attackers to access files or execute arbitrary code via crafted glyph descriptions in a Type1 font, which bypasses a signed comparison and triggers a buffer overflow.

Read the notes from the security team

Status

No maintained releases are affected by this CVE.

Package Ubuntu Release Status
openjdk-6 10.04 LTS lucid
Not affected
9.10 karmic
Not affected
9.04 jaunty
Not affected
8.10 intrepid
Not affected
8.04 LTS hardy
Not affected
7.10 gutsy Not in release
6.06 LTS dapper Not in release
sun-java5 10.04 LTS lucid Not in release
9.10 karmic Not in release
9.04 jaunty
Not affected
8.10 intrepid Ignored end of life, was needs-triage
8.04 LTS hardy
Not affected
7.10 gutsy Ignored end of life, was needs-triage
6.06 LTS dapper Ignored end of life
sun-java6 10.04 LTS lucid
Fixed 6.20dlj-1ubuntu3
9.10 karmic
Fixed 6.20dlj-0ubuntu1.9.10
9.04 jaunty
Fixed 6.20dlj-0ubuntu1.9.04
8.10 intrepid Ignored end of life, was needs-triage
8.04 LTS hardy
Fixed 6.20dlj-0ubuntu1.8.04
7.10 gutsy Ignored end of life, was needs-triage
6.06 LTS dapper Not in release

Notes


kees

RedHat lists this as “OpenJDK: Type1 font processing buffer overflow vulnerability” and bug 492302. Sun’s bug seems to be 6804999, from http://sunsolve.sun.com/search/document.do?assetkey=1-26-254571-1