Oracle has squashed a decade-old bug in its Java programming framework that allows attackers to bring down sensitive servers by feeding them numerical values with large numbers of decimal places. The vulnerability in the latest version of Java was disclosed last month and reported by The Reg on Monday. The bug, which stems from …
not the only one perhaps?
Has anyone thought to check C#?
After all these str to decimal type conversions near limits, are not just potentially an issue for one runtime.
As reg reported previously bug affected two languages, but both of those now fixed.
no problem on .NET
at least not for this value. ;)
I wonder if the exact same identical bug exists in Android, I mean that would be pure coincidence of course...
Why would it fail in Android?
The failure is in Java runtime classes which Android doesn't use, if it did use them then it would offer some sort of JDK compatibility.
> Why would it fail in Android?
Red Arrows moment?
> which Android doesn't use
I guess we'll wait for the courts to decide.
- Leaked screenshots show next Windows kernel to be a perfect 10
- Product round-up Coming clean: Ten cordless vacuum cleaners
- Something for the Weekend, Sir? I need a password to BRAKE? What? No! STOP! Aaaargh!
- Episode 13 BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
- Vulture at the Wheel Ford's B-Max: Fiesta-based runaround that goes THUNK