Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
Red Hat Logo Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Troubleshooting an issue? Try Solution Engine—our new support tool.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • Español
  • Deutsch
  • Italiano
  • 한국어
  • Français
  • 日本語
  • Português
  • 中文 (中国)
  • русский
Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • JBoss Development and Management

  • JBoss Integration and Automation

  • Mobile

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Tower
  • Red Hat Ansible Engine
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat Cloud Infrastructure
  • Red Hat Cloud Suite
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat OpenShift Application Runtimes
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat JBoss Data Grid
  • Red Hat JBoss Web Server
  • Red Hat JBoss Operations Network
  • Red Hat Developer Studio
  • Red Hat JBoss Data Virtualization
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
  • Red Hat 3scale API Management
  • Red Hat Mobile Application Platform
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycle & Update Policies

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem
  • Browse Certified Solutions
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting
  • Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses for high-priority security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2008:0156 - Security Advisory
Issued:
2008-03-05
Updated:
2008-03-05

RHSA-2008:0156 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Moderate: java-1.5.0-bea security update

Type/Severity

Security Advisory: Moderate

Topic

Updated java-1.5.0-bea packages that correct several security issues are
now available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.

This update has been rated as having moderate security impact by the Red
Hat Security Response Team.

Description

The BEA WebLogic JRockit 1.5.0_14 JRE and SDK contain BEA WebLogic JRockit
Virtual Machine 1.5.0_14 and are certified for the Java 5 Platform,
Standard Edition, v1.5.0.

A flaw in the applet caching mechanism of the Java Runtime Environment
(JRE) did not correctly process the creation of network connections. A
remote attacker could use this flaw to create connections to services on
machines other than the one that the applet was downloaded from.
(CVE-2007-5232)

Untrusted Java Applets were able to drag and drop a file to a Desktop
Application. A user-assisted remote attacker could use this flaw to move or
copy arbitrary files. (CVE-2007-5239)

The Java Runtime Environment (JRE) allowed untrusted Java Applets or
applications to display oversized windows. This could be used by remote
attackers to hide security warning banners. (CVE-2007-5240)

Unsigned Java Applets communicating via a HTTP proxy could allow a remote
attacker to violate the Java security model. A cached, malicious Applet
could create network connections to services on other machines. (CVE-2007-5273)

Two vulnerabilities in the Java Runtime Environment allowed an untrusted
application or applet to elevate the assigned privileges. This could be
misused by a malicious website to read and write local files or execute
local applications in the context of the user running the Java process.
(CVE-2008-0657)

Those vulnerabilities concerned with applets can only be triggered in
java-1.5.0-bea by calling the 'appletviewer' application.

All users of java-1.5.0-bea should upgrade to these updated packages, which
contain the BEA WebLogic JRockit 1.5.0_14 release that resolves these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Server - Extended Update Support 5.1 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support 5.1 ia64
  • Red Hat Enterprise Linux Server - Extended Update Support 5.1 i386
  • Red Hat Enterprise Linux Server - Extended Update Support 4ES x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support 4ES ia64
  • Red Hat Enterprise Linux Server - Extended Update Support 4ES i386
  • Red Hat Enterprise Linux Server - Extended Update Support 4AS x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support 4AS ia64
  • Red Hat Enterprise Linux Server - Extended Update Support 4AS i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 321951 - CVE-2007-5232 Security Vulnerability in Java Runtime Environment With Applet Caching
  • BZ - 321981 - CVE-2007-5239 Untrusted Application or Applet May Move or Copy Arbitrary Files
  • BZ - 321991 - CVE-2007-5240 Applets or Applications are allowed to display an oversized window
  • BZ - 324351 - CVE-2007-5273 Anti-DNS Pinning and Java Applets with HTTP proxy
  • BZ - 431861 - CVE-2008-0657 java-1.5.0 Privilege escalation via unstrusted applet and application

CVEs

  • CVE-2007-5239
  • CVE-2007-5232
  • CVE-2007-5273
  • CVE-2007-5240
  • CVE-2008-0657

References

  • http://dev2dev.bea.com/pub/advisory/272
  • http://www.redhat.com/security/updates/classification/#moderate
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
x86_64
java-1.5.0-bea-1.5.0.14-1jpp.1.el5.x86_64.rpm SHA-256: ff6d42244ea8e683960585800b01fe5281cd8981408e9d5b6b225a8f299c9722
java-1.5.0-bea-demo-1.5.0.14-1jpp.1.el5.x86_64.rpm SHA-256: 8b63f707c0aec203866611a6231b0e265a24073ae334ccf8185fac5c43f0f221
java-1.5.0-bea-devel-1.5.0.14-1jpp.1.el5.x86_64.rpm SHA-256: 0971a9bb24ce1606aae767eff6ea787e2456f439254afd6fb60473c96d2f63dd
java-1.5.0-bea-jdbc-1.5.0.14-1jpp.1.el5.x86_64.rpm SHA-256: d920bfbcb13799809ffcb72f2c0459dd5e8c099fbb3d69dd213158298545c483
java-1.5.0-bea-missioncontrol-1.5.0.14-1jpp.1.el5.x86_64.rpm SHA-256: 1ea99eb54fca9d2be4dd5fad2cb29a1a676be9d4167601a5cbf5c27968ce3e00
java-1.5.0-bea-src-1.5.0.14-1jpp.1.el5.x86_64.rpm SHA-256: 61e65a488bdba04ed807e09dc844ab4227c6c2f51e3d7d9913d33d68c92849ce
ia64
java-1.5.0-bea-1.5.0.14-1jpp.1.el5.ia64.rpm SHA-256: c912d671b5404b10e0758a792f2b91754a59c54945d02d7e330231e86bcdece3
java-1.5.0-bea-demo-1.5.0.14-1jpp.1.el5.ia64.rpm SHA-256: c80159c48d6d79cb8b59c4f9dc0661ff5f43bb30437e56bd6bfc47dee91fb64f
java-1.5.0-bea-devel-1.5.0.14-1jpp.1.el5.ia64.rpm SHA-256: 55cbab37593107b7a22703d030aeb8973d52fc6c2a22ec7ba491bbe03f771a23
java-1.5.0-bea-jdbc-1.5.0.14-1jpp.1.el5.ia64.rpm SHA-256: 6cc5f950bcdac55ecfafab05d26843e11fcdbe298aead15b4b00b9c13b0b2214
java-1.5.0-bea-src-1.5.0.14-1jpp.1.el5.ia64.rpm SHA-256: 183158a356be854aa8f3d705e39b0b44feab8dfe5bb25085729b57404bb2770c
i386
java-1.5.0-bea-1.5.0.14-1jpp.1.el5.i686.rpm SHA-256: 496dcb1b7366cd3f58b605d2fa35ed4237753c3681a1ec531b09ef80cb2b94bd
java-1.5.0-bea-demo-1.5.0.14-1jpp.1.el5.i686.rpm SHA-256: 99ff446e48434bd95dce0d18f4de6316dac807e17294435fd17567acbb9594ad
java-1.5.0-bea-devel-1.5.0.14-1jpp.1.el5.i686.rpm SHA-256: 8b08bb4cd57b92530a37484107d3fe4a0456fe77824411eabe211dc39bcae1b6
java-1.5.0-bea-jdbc-1.5.0.14-1jpp.1.el5.i686.rpm SHA-256: e3a247208484e7254b9de5035df82a4b42d5f798faf7487f3b3e3ea6000d82fb
java-1.5.0-bea-missioncontrol-1.5.0.14-1jpp.1.el5.i686.rpm SHA-256: 4c66253ce435bcb3b05f3e67c8769adc600328ce0d2c9fa3340a5ac0b100eaf5
java-1.5.0-bea-src-1.5.0.14-1jpp.1.el5.i686.rpm SHA-256: 520c12534f6187b7b58c60185e4c98ea2d2d4e2d0d1be5983ba07e250ff2c863

Red Hat Enterprise Linux Server from RHUI 5

SRPM
x86_64
java-1.5.0-bea-1.5.0.14-1jpp.1.el5.x86_64.rpm SHA-256: ff6d42244ea8e683960585800b01fe5281cd8981408e9d5b6b225a8f299c9722
java-1.5.0-bea-demo-1.5.0.14-1jpp.1.el5.x86_64.rpm SHA-256: 8b63f707c0aec203866611a6231b0e265a24073ae334ccf8185fac5c43f0f221
java-1.5.0-bea-devel-1.5.0.14-1jpp.1.el5.x86_64.rpm SHA-256: 0971a9bb24ce1606aae767eff6ea787e2456f439254afd6fb60473c96d2f63dd
java-1.5.0-bea-jdbc-1.5.0.14-1jpp.1.el5.x86_64.rpm SHA-256: d920bfbcb13799809ffcb72f2c0459dd5e8c099fbb3d69dd213158298545c483
java-1.5.0-bea-missioncontrol-1.5.0.14-1jpp.1.el5.x86_64.rpm SHA-256: 1ea99eb54fca9d2be4dd5fad2cb29a1a676be9d4167601a5cbf5c27968ce3e00
java-1.5.0-bea-src-1.5.0.14-1jpp.1.el5.x86_64.rpm SHA-256: 61e65a488bdba04ed807e09dc844ab4227c6c2f51e3d7d9913d33d68c92849ce
i386
java-1.5.0-bea-1.5.0.14-1jpp.1.el5.i686.rpm SHA-256: 496dcb1b7366cd3f58b605d2fa35ed4237753c3681a1ec531b09ef80cb2b94bd
java-1.5.0-bea-demo-1.5.0.14-1jpp.1.el5.i686.rpm SHA-256: 99ff446e48434bd95dce0d18f4de6316dac807e17294435fd17567acbb9594ad
java-1.5.0-bea-devel-1.5.0.14-1jpp.1.el5.i686.rpm SHA-256: 8b08bb4cd57b92530a37484107d3fe4a0456fe77824411eabe211dc39bcae1b6
java-1.5.0-bea-jdbc-1.5.0.14-1jpp.1.el5.i686.rpm SHA-256: e3a247208484e7254b9de5035df82a4b42d5f798faf7487f3b3e3ea6000d82fb
java-1.5.0-bea-missioncontrol-1.5.0.14-1jpp.1.el5.i686.rpm SHA-256: 4c66253ce435bcb3b05f3e67c8769adc600328ce0d2c9fa3340a5ac0b100eaf5
java-1.5.0-bea-src-1.5.0.14-1jpp.1.el5.i686.rpm SHA-256: 520c12534f6187b7b58c60185e4c98ea2d2d4e2d0d1be5983ba07e250ff2c863

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2018 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook Google+