CVE-2010-4476
Publication date 17 February 2011
Last updated 24 July 2024
Ubuntu priority
The Double.parseDouble method in Java Runtime Environment (JRE) in Oracle Java SE and Java for Business 6 Update 23 and earlier, 5.0 Update 27 and earlier, and 1.4.2_29 and earlier, as used in OpenJDK, Apache, JBossweb, and other products, allows remote attackers to cause a denial of service via a crafted string that triggers an infinite loop of estimations during conversion to a double-precision binary floating-point number, as demonstrated using 2.2250738585072012e-308.
Status
Package | Ubuntu Release | Status |
---|---|---|
openjdk-6 | ||
openjdk-6b18 | ||
sun-java5 | ||
sun-java6 | ||
References
Related Ubuntu Security Notices (USN)
- USN-1079-1
- OpenJDK 6 vulnerabilities
- 1 March 2011
- USN-1079-2
- OpenJDK 6 vulnerabilities
- 15 March 2011
- USN-1079-3
- OpenJDK 6 vulnerabilities
- 17 March 2011