- Issued:
- 2008-07-14
- Updated:
- 2008-07-14
RHSA-2008:0555 - Security Advisory
Synopsis
Critical: java-1.4.2-ibm security update
Type/Severity
Security Advisory: Critical
Topic
Updated java-1.4.2-ibm packages that fix several security issues are now
available for Red Hat Enterprise Linux 3 and 4 Extras, and 5 Supplementary.
This update has been rated as having critical security impact by the Red
Hat Security Response Team.
Description
IBM's 1.4.2 SR11 Java release includes the IBM Java 2 Runtime Environment
and the IBM Java 2 Software Development Kit.
A flaw was found in the Java XSLT processing classes. An untrusted
application or applet could cause a denial of service, or execute arbitrary
code with the permissions of the user running the JRE. (CVE-2008-1187)
A buffer overflow flaw was found in Java Web Start (JWS). An untrusted
application using the Java Network Launch Protocol (JNLP) could access
local files or execute local applications accessible to the user running
the JRE. (CVE-2008-1196)
All users of java-1.4.2-ibm are advised to upgrade to these updated
packages, which contain IBM's 1.4.2 SR11 Java release which resolves these
issues.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Server 3 x86_64
- Red Hat Enterprise Linux Server 3 ia64
- Red Hat Enterprise Linux Server 3 i386
- Red Hat Enterprise Linux Server - Extended Update Support 5.2 x86_64
- Red Hat Enterprise Linux Server - Extended Update Support 5.2 ia64
- Red Hat Enterprise Linux Server - Extended Update Support 5.2 i386
- Red Hat Enterprise Linux Server - Extended Update Support 4ES x86_64
- Red Hat Enterprise Linux Server - Extended Update Support 4ES ia64
- Red Hat Enterprise Linux Server - Extended Update Support 4ES i386
- Red Hat Enterprise Linux Server - Extended Update Support 4AS x86_64
- Red Hat Enterprise Linux Server - Extended Update Support 4AS ia64
- Red Hat Enterprise Linux Server - Extended Update Support 4AS i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Workstation 3 x86_64
- Red Hat Enterprise Linux Workstation 3 ia64
- Red Hat Enterprise Linux Workstation 3 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux Desktop 3 x86_64
- Red Hat Enterprise Linux Desktop 3 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for IBM z Systems 3 s390x
- Red Hat Enterprise Linux for IBM z Systems 3 s390
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.2 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4AS s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4AS s390
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux for Power, big endian 4 ppc
- Red Hat Enterprise Linux for Power, big endian 3 ppc
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.2 ppc
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4AS ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 436030 - CVE-2008-1187 Untrusted applet and application XSLT processing privilege escalation
- BZ - 436302 - CVE-2008-1196 Buffer overflow security vulnerabilities in Java Web Start
CVEs
References
Red Hat Enterprise Linux Server 5
| SRPM | |
|---|---|
| x86_64 | |
| java-1.4.2-ibm-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: d20709a14e2be9756e248626c7ec5c957b8f7674691aaa9986ddb271c78ec5d4 |
| java-1.4.2-ibm-1.4.2.11-1jpp.2.el5.x86_64.rpm | SHA-256: ccd93cb09a16209dc8e353ea1a901fff0ca56c66cd5f7ce25cc9dfc86b27a32a |
| java-1.4.2-ibm-demo-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: 5bd3df9a095d57df6e382ad65811235b74dd95e48561c01ffac30357e494c669 |
| java-1.4.2-ibm-demo-1.4.2.11-1jpp.2.el5.x86_64.rpm | SHA-256: 9474ad3551de7a9b0b1281c1fb8015d46e3bae04472848378ba5e87f88aadc84 |
| java-1.4.2-ibm-devel-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: ed1e40c83baf5a7922e1b9582fbf2ea5042a9e5703315ea63810e16ecb2ba2cc |
| java-1.4.2-ibm-devel-1.4.2.11-1jpp.2.el5.x86_64.rpm | SHA-256: e58f1e4a5873217871719a7169d1a72439cc72a249985bd0a3a8ca9a3dfa0dc4 |
| java-1.4.2-ibm-javacomm-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: c3bc0789183a04a4d2b2bee2009e02f6884fdfad5ce94a1065d293c61f2ccdb5 |
| java-1.4.2-ibm-javacomm-1.4.2.11-1jpp.2.el5.x86_64.rpm | SHA-256: dd755e3f05ad16eb54b344c1e0180f4ac884e7d2c456ac072b835faba5448ae1 |
| java-1.4.2-ibm-jdbc-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: eb3c43c3f48a7b4a3d6788e9c700655bc82998f402030f153524a659a17b3cf9 |
| java-1.4.2-ibm-plugin-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: f3f0ca2587890cec792c227ade47570458260a05e5fe482335ec87ef3a2bf875 |
| java-1.4.2-ibm-src-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: 589b1a9ad908e87760ab8c073dd75794e8eeaac8825dcee06f4d3cfe8ac315cd |
| java-1.4.2-ibm-src-1.4.2.11-1jpp.2.el5.x86_64.rpm | SHA-256: 9669b2f0c42723a0a40fcc3b30d21fde1cf1fe7c678ca81fbf5f95ce8b5080af |
| ia64 | |
| java-1.4.2-ibm-1.4.2.11-1jpp.2.el5.ia64.rpm | SHA-256: 3b5221fc13eac16f8362f4d7900cd7935ecfd6e1efa38ef77c68903317b54313 |
| java-1.4.2-ibm-demo-1.4.2.11-1jpp.2.el5.ia64.rpm | SHA-256: abbde83c5a4e7e3289f0c4c43b76df4db9c3961f0c2f1b8b6539f7c23a18ec10 |
| java-1.4.2-ibm-devel-1.4.2.11-1jpp.2.el5.ia64.rpm | SHA-256: c88e22b0a82b328b9e9553e872f17bb5f3225352c3a42f204e3f32da797c50c1 |
| java-1.4.2-ibm-src-1.4.2.11-1jpp.2.el5.ia64.rpm | SHA-256: 2afd595777efcfe2632e80ada2f87c376bc3933a221099a5fc510a3346eb9452 |
| i386 | |
| java-1.4.2-ibm-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: d20709a14e2be9756e248626c7ec5c957b8f7674691aaa9986ddb271c78ec5d4 |
| java-1.4.2-ibm-demo-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: 5bd3df9a095d57df6e382ad65811235b74dd95e48561c01ffac30357e494c669 |
| java-1.4.2-ibm-devel-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: ed1e40c83baf5a7922e1b9582fbf2ea5042a9e5703315ea63810e16ecb2ba2cc |
| java-1.4.2-ibm-javacomm-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: c3bc0789183a04a4d2b2bee2009e02f6884fdfad5ce94a1065d293c61f2ccdb5 |
| java-1.4.2-ibm-jdbc-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: eb3c43c3f48a7b4a3d6788e9c700655bc82998f402030f153524a659a17b3cf9 |
| java-1.4.2-ibm-plugin-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: f3f0ca2587890cec792c227ade47570458260a05e5fe482335ec87ef3a2bf875 |
| java-1.4.2-ibm-src-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: 589b1a9ad908e87760ab8c073dd75794e8eeaac8825dcee06f4d3cfe8ac315cd |
Red Hat Enterprise Linux Workstation 5
| SRPM | |
|---|---|
| x86_64 | |
| java-1.4.2-ibm-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: d20709a14e2be9756e248626c7ec5c957b8f7674691aaa9986ddb271c78ec5d4 |
| java-1.4.2-ibm-1.4.2.11-1jpp.2.el5.x86_64.rpm | SHA-256: ccd93cb09a16209dc8e353ea1a901fff0ca56c66cd5f7ce25cc9dfc86b27a32a |
| java-1.4.2-ibm-demo-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: 5bd3df9a095d57df6e382ad65811235b74dd95e48561c01ffac30357e494c669 |
| java-1.4.2-ibm-demo-1.4.2.11-1jpp.2.el5.x86_64.rpm | SHA-256: 9474ad3551de7a9b0b1281c1fb8015d46e3bae04472848378ba5e87f88aadc84 |
| java-1.4.2-ibm-devel-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: ed1e40c83baf5a7922e1b9582fbf2ea5042a9e5703315ea63810e16ecb2ba2cc |
| java-1.4.2-ibm-devel-1.4.2.11-1jpp.2.el5.x86_64.rpm | SHA-256: e58f1e4a5873217871719a7169d1a72439cc72a249985bd0a3a8ca9a3dfa0dc4 |
| java-1.4.2-ibm-javacomm-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: c3bc0789183a04a4d2b2bee2009e02f6884fdfad5ce94a1065d293c61f2ccdb5 |
| java-1.4.2-ibm-javacomm-1.4.2.11-1jpp.2.el5.x86_64.rpm | SHA-256: dd755e3f05ad16eb54b344c1e0180f4ac884e7d2c456ac072b835faba5448ae1 |
| java-1.4.2-ibm-jdbc-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: eb3c43c3f48a7b4a3d6788e9c700655bc82998f402030f153524a659a17b3cf9 |
| java-1.4.2-ibm-plugin-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: f3f0ca2587890cec792c227ade47570458260a05e5fe482335ec87ef3a2bf875 |
| java-1.4.2-ibm-src-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: 589b1a9ad908e87760ab8c073dd75794e8eeaac8825dcee06f4d3cfe8ac315cd |
| java-1.4.2-ibm-src-1.4.2.11-1jpp.2.el5.x86_64.rpm | SHA-256: 9669b2f0c42723a0a40fcc3b30d21fde1cf1fe7c678ca81fbf5f95ce8b5080af |
| i386 | |
| java-1.4.2-ibm-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: d20709a14e2be9756e248626c7ec5c957b8f7674691aaa9986ddb271c78ec5d4 |
| java-1.4.2-ibm-demo-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: 5bd3df9a095d57df6e382ad65811235b74dd95e48561c01ffac30357e494c669 |
| java-1.4.2-ibm-devel-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: ed1e40c83baf5a7922e1b9582fbf2ea5042a9e5703315ea63810e16ecb2ba2cc |
| java-1.4.2-ibm-javacomm-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: c3bc0789183a04a4d2b2bee2009e02f6884fdfad5ce94a1065d293c61f2ccdb5 |
| java-1.4.2-ibm-jdbc-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: eb3c43c3f48a7b4a3d6788e9c700655bc82998f402030f153524a659a17b3cf9 |
| java-1.4.2-ibm-plugin-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: f3f0ca2587890cec792c227ade47570458260a05e5fe482335ec87ef3a2bf875 |
| java-1.4.2-ibm-src-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: 589b1a9ad908e87760ab8c073dd75794e8eeaac8825dcee06f4d3cfe8ac315cd |
Red Hat Enterprise Linux Desktop 5
| SRPM | |
|---|---|
| x86_64 | |
| java-1.4.2-ibm-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: d20709a14e2be9756e248626c7ec5c957b8f7674691aaa9986ddb271c78ec5d4 |
| java-1.4.2-ibm-1.4.2.11-1jpp.2.el5.x86_64.rpm | SHA-256: ccd93cb09a16209dc8e353ea1a901fff0ca56c66cd5f7ce25cc9dfc86b27a32a |
| java-1.4.2-ibm-demo-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: 5bd3df9a095d57df6e382ad65811235b74dd95e48561c01ffac30357e494c669 |
| java-1.4.2-ibm-demo-1.4.2.11-1jpp.2.el5.x86_64.rpm | SHA-256: 9474ad3551de7a9b0b1281c1fb8015d46e3bae04472848378ba5e87f88aadc84 |
| java-1.4.2-ibm-devel-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: ed1e40c83baf5a7922e1b9582fbf2ea5042a9e5703315ea63810e16ecb2ba2cc |
| java-1.4.2-ibm-devel-1.4.2.11-1jpp.2.el5.x86_64.rpm | SHA-256: e58f1e4a5873217871719a7169d1a72439cc72a249985bd0a3a8ca9a3dfa0dc4 |
| java-1.4.2-ibm-javacomm-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: c3bc0789183a04a4d2b2bee2009e02f6884fdfad5ce94a1065d293c61f2ccdb5 |
| java-1.4.2-ibm-javacomm-1.4.2.11-1jpp.2.el5.x86_64.rpm | SHA-256: dd755e3f05ad16eb54b344c1e0180f4ac884e7d2c456ac072b835faba5448ae1 |
| java-1.4.2-ibm-jdbc-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: eb3c43c3f48a7b4a3d6788e9c700655bc82998f402030f153524a659a17b3cf9 |
| java-1.4.2-ibm-plugin-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: f3f0ca2587890cec792c227ade47570458260a05e5fe482335ec87ef3a2bf875 |
| java-1.4.2-ibm-src-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: 589b1a9ad908e87760ab8c073dd75794e8eeaac8825dcee06f4d3cfe8ac315cd |
| java-1.4.2-ibm-src-1.4.2.11-1jpp.2.el5.x86_64.rpm | SHA-256: 9669b2f0c42723a0a40fcc3b30d21fde1cf1fe7c678ca81fbf5f95ce8b5080af |
| i386 | |
| java-1.4.2-ibm-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: d20709a14e2be9756e248626c7ec5c957b8f7674691aaa9986ddb271c78ec5d4 |
| java-1.4.2-ibm-demo-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: 5bd3df9a095d57df6e382ad65811235b74dd95e48561c01ffac30357e494c669 |
| java-1.4.2-ibm-devel-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: ed1e40c83baf5a7922e1b9582fbf2ea5042a9e5703315ea63810e16ecb2ba2cc |
| java-1.4.2-ibm-javacomm-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: c3bc0789183a04a4d2b2bee2009e02f6884fdfad5ce94a1065d293c61f2ccdb5 |
| java-1.4.2-ibm-jdbc-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: eb3c43c3f48a7b4a3d6788e9c700655bc82998f402030f153524a659a17b3cf9 |
| java-1.4.2-ibm-plugin-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: f3f0ca2587890cec792c227ade47570458260a05e5fe482335ec87ef3a2bf875 |
| java-1.4.2-ibm-src-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: 589b1a9ad908e87760ab8c073dd75794e8eeaac8825dcee06f4d3cfe8ac315cd |
Red Hat Enterprise Linux for IBM z Systems 5
| SRPM | |
|---|---|
| s390x | |
| java-1.4.2-ibm-1.4.2.11-1jpp.2.el5.s390.rpm | SHA-256: 8dff94f29004e8a6e5924668703e9f77069e8a2b42d0789d1d7abc05b4483996 |
| java-1.4.2-ibm-1.4.2.11-1jpp.2.el5.s390x.rpm | SHA-256: 52eba7ac323d62dd22466d572239cf01ab9db617955bf4e4096b36961a3249e6 |
| java-1.4.2-ibm-demo-1.4.2.11-1jpp.2.el5.s390.rpm | SHA-256: 1b544f545ae5a6353a689664becb8a1b7870c492e992312432f71919aa8c3348 |
| java-1.4.2-ibm-demo-1.4.2.11-1jpp.2.el5.s390x.rpm | SHA-256: e9fc3db34928ab7f30142514655de226456c0a46a12d869c7d4ed3aa1e8dabc8 |
| java-1.4.2-ibm-devel-1.4.2.11-1jpp.2.el5.s390.rpm | SHA-256: fe2ffd67f025c166fde78e6ae8e487b3fb62e0bf929b94ebbce924619c888b66 |
| java-1.4.2-ibm-devel-1.4.2.11-1jpp.2.el5.s390x.rpm | SHA-256: c21047042ebffa7868f845d64bb611d4d521d486b9c8fb94f228e36096dd0cb4 |
| java-1.4.2-ibm-jdbc-1.4.2.11-1jpp.2.el5.s390.rpm | SHA-256: 26888ed1c14ab552680ee5b263d616b342a2060cd0f0c359d5ee442c82ac4a29 |
| java-1.4.2-ibm-src-1.4.2.11-1jpp.2.el5.s390.rpm | SHA-256: 4591bfe57c363b5050c1e1a7ce6459274edef699fcedf2d10df1e26b8e4bea28 |
| java-1.4.2-ibm-src-1.4.2.11-1jpp.2.el5.s390x.rpm | SHA-256: 43c7563f447703030f09652dde5d70f29c3b7e9fc39de8553f0e4fe4776b16df |
Red Hat Enterprise Linux for Power, big endian 5
| SRPM | |
|---|---|
| ppc | |
| java-1.4.2-ibm-1.4.2.11-1jpp.2.el5.ppc.rpm | SHA-256: 3755a8393515ca4d6899d879c5c6079ceba5da2194a38fd910c0e453eb017dab |
| java-1.4.2-ibm-1.4.2.11-1jpp.2.el5.ppc64.rpm | SHA-256: 31bbd115ec5f65609351ddc5380c0d9e87a09985508dc9fff66563ed977274ea |
| java-1.4.2-ibm-demo-1.4.2.11-1jpp.2.el5.ppc.rpm | SHA-256: 2c1e4bd2ac44700a5d24e84b41be784371e6d476ac565e446c78b4f42c36171e |
| java-1.4.2-ibm-demo-1.4.2.11-1jpp.2.el5.ppc64.rpm | SHA-256: dcf227b542ae61ca9c7ac07e0ac5215d800be8019f085ef20e6345b81adb11ed |
| java-1.4.2-ibm-devel-1.4.2.11-1jpp.2.el5.ppc.rpm | SHA-256: 1a52d130b33cea97a89b1812162343b422803803e3540668410b1e10ba2f7daf |
| java-1.4.2-ibm-devel-1.4.2.11-1jpp.2.el5.ppc64.rpm | SHA-256: 4e0530d0b0d00f8e8cc06cc6e6171fca6ff981703e3ea642ea8ea634b9b4a8ae |
| java-1.4.2-ibm-javacomm-1.4.2.11-1jpp.2.el5.ppc.rpm | SHA-256: a09cfec6588798be277e4c882ca45cecf25d4dd8d9a844287f7224b44fc583dc |
| java-1.4.2-ibm-javacomm-1.4.2.11-1jpp.2.el5.ppc64.rpm | SHA-256: aeb7d34b388863797dda05de317c008d9ee706023e82ee364d5484107288a483 |
| java-1.4.2-ibm-jdbc-1.4.2.11-1jpp.2.el5.ppc.rpm | SHA-256: 4bdf745a05a0b63c1e3b555552aed92e84d0edf5cb352c22207bb5c5f4e73b06 |
| java-1.4.2-ibm-src-1.4.2.11-1jpp.2.el5.ppc.rpm | SHA-256: 4eb4510c32a88005ae9cf2e0817b72e54152a5f00f21c21e314855b64d69d011 |
| java-1.4.2-ibm-src-1.4.2.11-1jpp.2.el5.ppc64.rpm | SHA-256: 33a09bb2f09ebcf1853e6fae1334609dc64785b96365c188daee1f883a114cd9 |
Red Hat Enterprise Linux Server from RHUI 5
| SRPM | |
|---|---|
| x86_64 | |
| java-1.4.2-ibm-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: d20709a14e2be9756e248626c7ec5c957b8f7674691aaa9986ddb271c78ec5d4 |
| java-1.4.2-ibm-1.4.2.11-1jpp.2.el5.x86_64.rpm | SHA-256: ccd93cb09a16209dc8e353ea1a901fff0ca56c66cd5f7ce25cc9dfc86b27a32a |
| java-1.4.2-ibm-demo-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: 5bd3df9a095d57df6e382ad65811235b74dd95e48561c01ffac30357e494c669 |
| java-1.4.2-ibm-demo-1.4.2.11-1jpp.2.el5.x86_64.rpm | SHA-256: 9474ad3551de7a9b0b1281c1fb8015d46e3bae04472848378ba5e87f88aadc84 |
| java-1.4.2-ibm-devel-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: ed1e40c83baf5a7922e1b9582fbf2ea5042a9e5703315ea63810e16ecb2ba2cc |
| java-1.4.2-ibm-devel-1.4.2.11-1jpp.2.el5.x86_64.rpm | SHA-256: e58f1e4a5873217871719a7169d1a72439cc72a249985bd0a3a8ca9a3dfa0dc4 |
| java-1.4.2-ibm-javacomm-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: c3bc0789183a04a4d2b2bee2009e02f6884fdfad5ce94a1065d293c61f2ccdb5 |
| java-1.4.2-ibm-javacomm-1.4.2.11-1jpp.2.el5.x86_64.rpm | SHA-256: dd755e3f05ad16eb54b344c1e0180f4ac884e7d2c456ac072b835faba5448ae1 |
| java-1.4.2-ibm-jdbc-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: eb3c43c3f48a7b4a3d6788e9c700655bc82998f402030f153524a659a17b3cf9 |
| java-1.4.2-ibm-plugin-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: f3f0ca2587890cec792c227ade47570458260a05e5fe482335ec87ef3a2bf875 |
| java-1.4.2-ibm-src-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: 589b1a9ad908e87760ab8c073dd75794e8eeaac8825dcee06f4d3cfe8ac315cd |
| java-1.4.2-ibm-src-1.4.2.11-1jpp.2.el5.x86_64.rpm | SHA-256: 9669b2f0c42723a0a40fcc3b30d21fde1cf1fe7c678ca81fbf5f95ce8b5080af |
| i386 | |
| java-1.4.2-ibm-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: d20709a14e2be9756e248626c7ec5c957b8f7674691aaa9986ddb271c78ec5d4 |
| java-1.4.2-ibm-demo-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: 5bd3df9a095d57df6e382ad65811235b74dd95e48561c01ffac30357e494c669 |
| java-1.4.2-ibm-devel-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: ed1e40c83baf5a7922e1b9582fbf2ea5042a9e5703315ea63810e16ecb2ba2cc |
| java-1.4.2-ibm-javacomm-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: c3bc0789183a04a4d2b2bee2009e02f6884fdfad5ce94a1065d293c61f2ccdb5 |
| java-1.4.2-ibm-jdbc-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: eb3c43c3f48a7b4a3d6788e9c700655bc82998f402030f153524a659a17b3cf9 |
| java-1.4.2-ibm-plugin-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: f3f0ca2587890cec792c227ade47570458260a05e5fe482335ec87ef3a2bf875 |
| java-1.4.2-ibm-src-1.4.2.11-1jpp.2.el5.i386.rpm | SHA-256: 589b1a9ad908e87760ab8c073dd75794e8eeaac8825dcee06f4d3cfe8ac315cd |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
