Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2008:0210 - Security Advisory
Issued:
2008-04-03
Updated:
2008-04-03

RHSA-2008:0210 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Critical: java-1.5.0-ibm security update

Type/Severity

Security Advisory: Critical

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated java-1.5.0-ibm packages that fix several security issues are now
available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.

This update has been rated as having critical security impact by the Red
Hat Security Response Team.

Description

IBM's 1.5.0 Java release includes the IBM Java 2 Runtime Environment and
the IBM Java 2 Software Development Kit.

Two vulnerabilities in the Java Runtime Environment allowed an untrusted
application or applet to elevate the assigned privileges. This could be
misused by a malicious website to read and write local files or execute
local applications in the context of the user running the Java process.
(CVE-2008-0657)

A flaw was found in the Java XSLT processing classes. An untrusted
application or applet could cause a denial of service, or execute arbitrary
code with the permissions of the user running the JRE. (CVE-2008-1187)

Several buffer overflow flaws were found in Java Web Start (JWS). An
untrusted JNLP application could access local files or execute local
applications accessible to the user running the JRE.
(CVE-2008-1188, CVE-2008-1189, CVE-2008-1190, CVE-2008-1196)

A flaw was found in the Java Plug-in. A remote attacker could bypass the
same origin policy, executing arbitrary code with the permissions of the
user running the JRE. (CVE-2008-1192)

A flaw was found in the JRE image parsing libraries. An untrusted
application or applet could cause a denial of service, or possible execute
arbitrary code with the permissions of the user running the JRE.
(CVE-2008-1193)

A flaw was found in the JRE color management library. An untrusted
application or applet could trigger a denial of service (JVM crash).
(CVE-2008-1194)

The JRE allowed untrusted JavaScript code to create local network
connections by the use of Java APIs. A remote attacker could use these
flaws to acesss local network services. (CVE-2008-1195)

All users of java-ibm-1.5.0 are advised to upgrade to these updated
packages, that contain IBM's 1.5.0 SR7 Java release which resolves these
issues.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4ES x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4ES i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4AS x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4AS i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.1 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4AS s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4AS s390
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.1 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4AS ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 431861 - CVE-2008-0657 java-1.5.0 Privilege escalation via unstrusted applet and application
  • BZ - 436030 - CVE-2008-1187 Untrusted applet and application XSLT processing privilege escalation
  • BZ - 436293 - CVE-2008-1188 Buffer overflow security vulnerabilities in Java Web Start (CVE-2008-1189, CVE-2008-1190)
  • BZ - 436295 - CVE-2008-1192 Java Plugin same-origin-policy bypass
  • BZ - 436296 - CVE-2008-1193 JRE image parsing library allows privilege escalation (CVE-2008-1194)
  • BZ - 436299 - CVE-2008-1195 Java-API calls in untrusted Javascript allow network privilege escalation
  • BZ - 436302 - CVE-2008-1196 Buffer overflow security vulnerabilities in Java Web Start

CVEs

  • CVE-2008-0657
  • CVE-2008-1189
  • CVE-2008-1188
  • CVE-2008-1187
  • CVE-2008-1193
  • CVE-2008-1194
  • CVE-2008-1195
  • CVE-2008-1196
  • CVE-2008-1190
  • CVE-2008-1192

References

  • http://www.redhat.com/security/updates/classification/#critical
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
x86_64
java-1.5.0-ibm-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 952a73017dd85e689f7533699b8fb0a2c44528a7ea70a4011a73f52819cd15ec
java-1.5.0-ibm-1.5.0.7-1jpp.2.el5.x86_64.rpm SHA-256: 423efc7eec306e6eaca4546f2287c234de6c1602ea51e53b0589478764ac9de8
java-1.5.0-ibm-accessibility-1.5.0.7-1jpp.2.el5.x86_64.rpm SHA-256: e7f449ea6e1bcb0325a16af7451f59f7085ca512c6e470c394b422c65279a832
java-1.5.0-ibm-demo-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 931666ccfcab87adf4197d93f81494ef312104069f499f77bcd7820a613520b0
java-1.5.0-ibm-demo-1.5.0.7-1jpp.2.el5.x86_64.rpm SHA-256: b1296669fff7da07724cb24573102e55b242cdd1389f00720e91dbec4c511a15
java-1.5.0-ibm-devel-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: e0fbc7419e31648ae1f665ddbf60a3ca396e0d29564b818c9cad1333f2fc24fe
java-1.5.0-ibm-devel-1.5.0.7-1jpp.2.el5.x86_64.rpm SHA-256: f62123dda24a38b9b92d7abc5f6b8ede741a63a3a55ff6f42807a6ddbae9bfe3
java-1.5.0-ibm-javacomm-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 49e46316563ea4693a1015cde08d35d25e3247f3c502db209d077f48de39a608
java-1.5.0-ibm-javacomm-1.5.0.7-1jpp.2.el5.x86_64.rpm SHA-256: 45b246ddbc842d2d7e1058c4985c3c4391ebb1ed25ea11c4d944c38d6e42733c
java-1.5.0-ibm-jdbc-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 7733394146e94b13313e557be32dbaf30cc221d4919c54f74bdd648acbede21e
java-1.5.0-ibm-plugin-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 3e9cdf99f72fa7d68caf77d1eaf292ff1fee08f90dfac9dc741830a76b5fd96e
java-1.5.0-ibm-src-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 722dbafcd67cc37c4538111f5a734d7ba413b1c9707d84bdd0edb6d774fc85e4
java-1.5.0-ibm-src-1.5.0.7-1jpp.2.el5.x86_64.rpm SHA-256: a7fb8343b45af0431fa36193ed024eede2f2cd00a20ddccbdda47f09c36e0818
i386
java-1.5.0-ibm-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 952a73017dd85e689f7533699b8fb0a2c44528a7ea70a4011a73f52819cd15ec
java-1.5.0-ibm-accessibility-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 1d848a6b69d8dd5dc132d5bd647da8b0dcafaeee75e1858401c9124b23c55068
java-1.5.0-ibm-demo-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 931666ccfcab87adf4197d93f81494ef312104069f499f77bcd7820a613520b0
java-1.5.0-ibm-devel-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: e0fbc7419e31648ae1f665ddbf60a3ca396e0d29564b818c9cad1333f2fc24fe
java-1.5.0-ibm-javacomm-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 49e46316563ea4693a1015cde08d35d25e3247f3c502db209d077f48de39a608
java-1.5.0-ibm-jdbc-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 7733394146e94b13313e557be32dbaf30cc221d4919c54f74bdd648acbede21e
java-1.5.0-ibm-plugin-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 3e9cdf99f72fa7d68caf77d1eaf292ff1fee08f90dfac9dc741830a76b5fd96e
java-1.5.0-ibm-src-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 722dbafcd67cc37c4538111f5a734d7ba413b1c9707d84bdd0edb6d774fc85e4

Red Hat Enterprise Linux Server 4

SRPM
x86_64
i386

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1

SRPM
x86_64
i386

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4ES

SRPM
x86_64
i386

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4AS

SRPM
x86_64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
x86_64
java-1.5.0-ibm-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 952a73017dd85e689f7533699b8fb0a2c44528a7ea70a4011a73f52819cd15ec
java-1.5.0-ibm-1.5.0.7-1jpp.2.el5.x86_64.rpm SHA-256: 423efc7eec306e6eaca4546f2287c234de6c1602ea51e53b0589478764ac9de8
java-1.5.0-ibm-accessibility-1.5.0.7-1jpp.2.el5.x86_64.rpm SHA-256: e7f449ea6e1bcb0325a16af7451f59f7085ca512c6e470c394b422c65279a832
java-1.5.0-ibm-demo-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 931666ccfcab87adf4197d93f81494ef312104069f499f77bcd7820a613520b0
java-1.5.0-ibm-demo-1.5.0.7-1jpp.2.el5.x86_64.rpm SHA-256: b1296669fff7da07724cb24573102e55b242cdd1389f00720e91dbec4c511a15
java-1.5.0-ibm-devel-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: e0fbc7419e31648ae1f665ddbf60a3ca396e0d29564b818c9cad1333f2fc24fe
java-1.5.0-ibm-devel-1.5.0.7-1jpp.2.el5.x86_64.rpm SHA-256: f62123dda24a38b9b92d7abc5f6b8ede741a63a3a55ff6f42807a6ddbae9bfe3
java-1.5.0-ibm-javacomm-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 49e46316563ea4693a1015cde08d35d25e3247f3c502db209d077f48de39a608
java-1.5.0-ibm-javacomm-1.5.0.7-1jpp.2.el5.x86_64.rpm SHA-256: 45b246ddbc842d2d7e1058c4985c3c4391ebb1ed25ea11c4d944c38d6e42733c
java-1.5.0-ibm-jdbc-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 7733394146e94b13313e557be32dbaf30cc221d4919c54f74bdd648acbede21e
java-1.5.0-ibm-plugin-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 3e9cdf99f72fa7d68caf77d1eaf292ff1fee08f90dfac9dc741830a76b5fd96e
java-1.5.0-ibm-src-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 722dbafcd67cc37c4538111f5a734d7ba413b1c9707d84bdd0edb6d774fc85e4
java-1.5.0-ibm-src-1.5.0.7-1jpp.2.el5.x86_64.rpm SHA-256: a7fb8343b45af0431fa36193ed024eede2f2cd00a20ddccbdda47f09c36e0818
i386
java-1.5.0-ibm-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 952a73017dd85e689f7533699b8fb0a2c44528a7ea70a4011a73f52819cd15ec
java-1.5.0-ibm-accessibility-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 1d848a6b69d8dd5dc132d5bd647da8b0dcafaeee75e1858401c9124b23c55068
java-1.5.0-ibm-demo-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 931666ccfcab87adf4197d93f81494ef312104069f499f77bcd7820a613520b0
java-1.5.0-ibm-devel-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: e0fbc7419e31648ae1f665ddbf60a3ca396e0d29564b818c9cad1333f2fc24fe
java-1.5.0-ibm-javacomm-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 49e46316563ea4693a1015cde08d35d25e3247f3c502db209d077f48de39a608
java-1.5.0-ibm-jdbc-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 7733394146e94b13313e557be32dbaf30cc221d4919c54f74bdd648acbede21e
java-1.5.0-ibm-plugin-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 3e9cdf99f72fa7d68caf77d1eaf292ff1fee08f90dfac9dc741830a76b5fd96e
java-1.5.0-ibm-src-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 722dbafcd67cc37c4538111f5a734d7ba413b1c9707d84bdd0edb6d774fc85e4

Red Hat Enterprise Linux Workstation 4

SRPM
x86_64
i386

Red Hat Enterprise Linux Desktop 5

SRPM
x86_64
java-1.5.0-ibm-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 952a73017dd85e689f7533699b8fb0a2c44528a7ea70a4011a73f52819cd15ec
java-1.5.0-ibm-1.5.0.7-1jpp.2.el5.x86_64.rpm SHA-256: 423efc7eec306e6eaca4546f2287c234de6c1602ea51e53b0589478764ac9de8
java-1.5.0-ibm-accessibility-1.5.0.7-1jpp.2.el5.x86_64.rpm SHA-256: e7f449ea6e1bcb0325a16af7451f59f7085ca512c6e470c394b422c65279a832
java-1.5.0-ibm-demo-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 931666ccfcab87adf4197d93f81494ef312104069f499f77bcd7820a613520b0
java-1.5.0-ibm-demo-1.5.0.7-1jpp.2.el5.x86_64.rpm SHA-256: b1296669fff7da07724cb24573102e55b242cdd1389f00720e91dbec4c511a15
java-1.5.0-ibm-devel-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: e0fbc7419e31648ae1f665ddbf60a3ca396e0d29564b818c9cad1333f2fc24fe
java-1.5.0-ibm-devel-1.5.0.7-1jpp.2.el5.x86_64.rpm SHA-256: f62123dda24a38b9b92d7abc5f6b8ede741a63a3a55ff6f42807a6ddbae9bfe3
java-1.5.0-ibm-javacomm-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 49e46316563ea4693a1015cde08d35d25e3247f3c502db209d077f48de39a608
java-1.5.0-ibm-javacomm-1.5.0.7-1jpp.2.el5.x86_64.rpm SHA-256: 45b246ddbc842d2d7e1058c4985c3c4391ebb1ed25ea11c4d944c38d6e42733c
java-1.5.0-ibm-jdbc-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 7733394146e94b13313e557be32dbaf30cc221d4919c54f74bdd648acbede21e
java-1.5.0-ibm-plugin-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 3e9cdf99f72fa7d68caf77d1eaf292ff1fee08f90dfac9dc741830a76b5fd96e
java-1.5.0-ibm-src-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 722dbafcd67cc37c4538111f5a734d7ba413b1c9707d84bdd0edb6d774fc85e4
java-1.5.0-ibm-src-1.5.0.7-1jpp.2.el5.x86_64.rpm SHA-256: a7fb8343b45af0431fa36193ed024eede2f2cd00a20ddccbdda47f09c36e0818
i386
java-1.5.0-ibm-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 952a73017dd85e689f7533699b8fb0a2c44528a7ea70a4011a73f52819cd15ec
java-1.5.0-ibm-accessibility-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 1d848a6b69d8dd5dc132d5bd647da8b0dcafaeee75e1858401c9124b23c55068
java-1.5.0-ibm-demo-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 931666ccfcab87adf4197d93f81494ef312104069f499f77bcd7820a613520b0
java-1.5.0-ibm-devel-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: e0fbc7419e31648ae1f665ddbf60a3ca396e0d29564b818c9cad1333f2fc24fe
java-1.5.0-ibm-javacomm-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 49e46316563ea4693a1015cde08d35d25e3247f3c502db209d077f48de39a608
java-1.5.0-ibm-jdbc-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 7733394146e94b13313e557be32dbaf30cc221d4919c54f74bdd648acbede21e
java-1.5.0-ibm-plugin-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 3e9cdf99f72fa7d68caf77d1eaf292ff1fee08f90dfac9dc741830a76b5fd96e
java-1.5.0-ibm-src-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 722dbafcd67cc37c4538111f5a734d7ba413b1c9707d84bdd0edb6d774fc85e4

Red Hat Enterprise Linux Desktop 4

SRPM
x86_64
i386

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
s390x
java-1.5.0-ibm-1.5.0.7-1jpp.2.el5.s390.rpm SHA-256: 59ab11e2c0d212756d0f649b1a381aba8efd52b0aba95f4658f1b578a1e0d69d
java-1.5.0-ibm-1.5.0.7-1jpp.2.el5.s390x.rpm SHA-256: ef515af237c718df4527960ef030585c07689e56465e37f338a2576e903f93db
java-1.5.0-ibm-accessibility-1.5.0.7-1jpp.2.el5.s390x.rpm SHA-256: 76c5ecc7f2a3d1c88462e97e1eacf6d9932e2fb7c3dce29e5af14b7a085e1564
java-1.5.0-ibm-demo-1.5.0.7-1jpp.2.el5.s390.rpm SHA-256: 38bae15fb2a8b718f88637fb3c5b115ecc2ed3bdcc1907d6373d49157f01eb98
java-1.5.0-ibm-demo-1.5.0.7-1jpp.2.el5.s390x.rpm SHA-256: f004ff8263cc42b50ff4276679cb77ef424025c8a3d00d915622ce27c54c06aa
java-1.5.0-ibm-devel-1.5.0.7-1jpp.2.el5.s390.rpm SHA-256: 224199c5d8ca9f0448531437fdeb3a34542f2c845b7e305f3cae9c74ed0aa1a2
java-1.5.0-ibm-devel-1.5.0.7-1jpp.2.el5.s390x.rpm SHA-256: 4679533194292f1349895a501e34d26ee09df64afdf7b40e62d38a7c9e42c9be
java-1.5.0-ibm-jdbc-1.5.0.7-1jpp.2.el5.s390.rpm SHA-256: 4fe915e8dc8aa1ad06c6776e84e23b81b8cee470a9d7eaca6da976b31f9a158c
java-1.5.0-ibm-src-1.5.0.7-1jpp.2.el5.s390.rpm SHA-256: c1b50a368cf44455bdb155822e899ae52bca6db8a79d4817c706ed3ef6c1c85a
java-1.5.0-ibm-src-1.5.0.7-1jpp.2.el5.s390x.rpm SHA-256: 3811eeb31fb26deadda6cfa909c6e3cf02db969c1a9c6633236fcc5d85179fac

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
s390x
s390

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.1

SRPM
s390x

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4AS

SRPM
s390x
s390

Red Hat Enterprise Linux for Power, big endian 5

SRPM
ppc
java-1.5.0-ibm-1.5.0.7-1jpp.2.el5.ppc.rpm SHA-256: c67420063a953fcbc2d27b83ece23a5f79ce6ffe5da33e09803b2f9803f9ce5a
java-1.5.0-ibm-1.5.0.7-1jpp.2.el5.ppc64.rpm SHA-256: 02259af281cd562b06fa6104eddc9a03b8c5cdacd556687130d617b7a5df68dd
java-1.5.0-ibm-accessibility-1.5.0.7-1jpp.2.el5.ppc.rpm SHA-256: 9cb9e5a27e2fed7a8b81521b98d986f772102b3b0f8bdb7b34231bed3104412f
java-1.5.0-ibm-demo-1.5.0.7-1jpp.2.el5.ppc.rpm SHA-256: 1ef9498ae850a1b1134148fb823b224d8b7c0718601a9e2df8b011408672af1c
java-1.5.0-ibm-demo-1.5.0.7-1jpp.2.el5.ppc64.rpm SHA-256: e3a8d4e2ce139d0b003762479f9e47b68720e341eeccadcf67c5d608e19050af
java-1.5.0-ibm-devel-1.5.0.7-1jpp.2.el5.ppc.rpm SHA-256: 4b751e221f6c3617b9c309b8de3b5d85c1b01a5d92fdd4e253d85d2637f40f1c
java-1.5.0-ibm-devel-1.5.0.7-1jpp.2.el5.ppc64.rpm SHA-256: b1d1cdf9ccb19987b5435d93eccbc349555f309f6d86de7d5fd973255a52b204
java-1.5.0-ibm-javacomm-1.5.0.7-1jpp.2.el5.ppc.rpm SHA-256: 1f3e636f90ce65aa546daac98aa8c2195c46d715783db4686b4be69ad2b5ed75
java-1.5.0-ibm-javacomm-1.5.0.7-1jpp.2.el5.ppc64.rpm SHA-256: 95c891b8760546bf84c15448929ac68829241948f23c554198421902b41d7d4d
java-1.5.0-ibm-jdbc-1.5.0.7-1jpp.2.el5.ppc.rpm SHA-256: 5108f7c7293017ad7a324469ad7aee0a78854a75b36de8eb5072985dabf24e1f
java-1.5.0-ibm-plugin-1.5.0.7-1jpp.2.el5.ppc.rpm SHA-256: 8d65ce863d42bad1b0b245e79958f6ad6eae91aa131b2d178d8f6caebfc27031
java-1.5.0-ibm-src-1.5.0.7-1jpp.2.el5.ppc.rpm SHA-256: 485bbbd27223d2b92d950ca6b1f5ddc22b8011423db4db813c2e6b8195c7dd89
java-1.5.0-ibm-src-1.5.0.7-1jpp.2.el5.ppc64.rpm SHA-256: 477acd45f4f0b1caf860d485099b1536bc82c76e92e276471e1e96addf040d09

Red Hat Enterprise Linux for Power, big endian 4

SRPM
ppc

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.1

SRPM
ppc

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4AS

SRPM
ppc

Red Hat Enterprise Linux Server from RHUI 5

SRPM
x86_64
java-1.5.0-ibm-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 952a73017dd85e689f7533699b8fb0a2c44528a7ea70a4011a73f52819cd15ec
java-1.5.0-ibm-1.5.0.7-1jpp.2.el5.x86_64.rpm SHA-256: 423efc7eec306e6eaca4546f2287c234de6c1602ea51e53b0589478764ac9de8
java-1.5.0-ibm-accessibility-1.5.0.7-1jpp.2.el5.x86_64.rpm SHA-256: e7f449ea6e1bcb0325a16af7451f59f7085ca512c6e470c394b422c65279a832
java-1.5.0-ibm-demo-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 931666ccfcab87adf4197d93f81494ef312104069f499f77bcd7820a613520b0
java-1.5.0-ibm-demo-1.5.0.7-1jpp.2.el5.x86_64.rpm SHA-256: b1296669fff7da07724cb24573102e55b242cdd1389f00720e91dbec4c511a15
java-1.5.0-ibm-devel-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: e0fbc7419e31648ae1f665ddbf60a3ca396e0d29564b818c9cad1333f2fc24fe
java-1.5.0-ibm-devel-1.5.0.7-1jpp.2.el5.x86_64.rpm SHA-256: f62123dda24a38b9b92d7abc5f6b8ede741a63a3a55ff6f42807a6ddbae9bfe3
java-1.5.0-ibm-javacomm-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 49e46316563ea4693a1015cde08d35d25e3247f3c502db209d077f48de39a608
java-1.5.0-ibm-javacomm-1.5.0.7-1jpp.2.el5.x86_64.rpm SHA-256: 45b246ddbc842d2d7e1058c4985c3c4391ebb1ed25ea11c4d944c38d6e42733c
java-1.5.0-ibm-jdbc-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 7733394146e94b13313e557be32dbaf30cc221d4919c54f74bdd648acbede21e
java-1.5.0-ibm-plugin-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 3e9cdf99f72fa7d68caf77d1eaf292ff1fee08f90dfac9dc741830a76b5fd96e
java-1.5.0-ibm-src-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 722dbafcd67cc37c4538111f5a734d7ba413b1c9707d84bdd0edb6d774fc85e4
java-1.5.0-ibm-src-1.5.0.7-1jpp.2.el5.x86_64.rpm SHA-256: a7fb8343b45af0431fa36193ed024eede2f2cd00a20ddccbdda47f09c36e0818
i386
java-1.5.0-ibm-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 952a73017dd85e689f7533699b8fb0a2c44528a7ea70a4011a73f52819cd15ec
java-1.5.0-ibm-accessibility-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 1d848a6b69d8dd5dc132d5bd647da8b0dcafaeee75e1858401c9124b23c55068
java-1.5.0-ibm-demo-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 931666ccfcab87adf4197d93f81494ef312104069f499f77bcd7820a613520b0
java-1.5.0-ibm-devel-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: e0fbc7419e31648ae1f665ddbf60a3ca396e0d29564b818c9cad1333f2fc24fe
java-1.5.0-ibm-javacomm-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 49e46316563ea4693a1015cde08d35d25e3247f3c502db209d077f48de39a608
java-1.5.0-ibm-jdbc-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 7733394146e94b13313e557be32dbaf30cc221d4919c54f74bdd648acbede21e
java-1.5.0-ibm-plugin-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 3e9cdf99f72fa7d68caf77d1eaf292ff1fee08f90dfac9dc741830a76b5fd96e
java-1.5.0-ibm-src-1.5.0.7-1jpp.2.el5.i386.rpm SHA-256: 722dbafcd67cc37c4538111f5a734d7ba413b1c9707d84bdd0edb6d774fc85e4

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility