Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2010:0786 - Security Advisory
Issued:
2010-10-20
Updated:
2010-10-20

RHSA-2010:0786 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Critical: java-1.4.2-ibm security update

Type/Severity

Security Advisory: Critical

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated java-1.4.2-ibm packages that fix several security issues are now
available for Red Hat Enterprise Linux 3 Extras, Red Hat Enterprise Linux 4
Extras, and Red Hat Enterprise Linux 5 Supplementary.

The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

The IBM 1.4.2 SR13-FP6 Java release includes the IBM Java 2 Runtime
Environment and the IBM Java 2 Software Development Kit.

This update fixes several vulnerabilities in the IBM Java 2 Runtime
Environment and the IBM Java 2 Software Development Kit. These
vulnerabilities are summarized on the IBM "Security alerts" page listed in
the References section. (CVE-2010-3541, CVE-2010-3548, CVE-2010-3549,
CVE-2010-3551, CVE-2010-3553, CVE-2010-3556, CVE-2010-3557, CVE-2010-3562,
CVE-2010-3565, CVE-2010-3568, CVE-2010-3569, CVE-2010-3571, CVE-2010-3572)

The RHSA-2010:0155 update mitigated a man-in-the-middle attack in the way
the TLS/SSL (Transport Layer Security/Secure Sockets Layer) protocols
handle session renegotiation by disabling renegotiation. This update
implements the TLS Renegotiation Indication Extension as defined in RFC
5746, allowing secure renegotiation between updated clients and servers.
(CVE-2009-3555)

All users of java-1.4.2-ibm are advised to upgrade to these updated
packages, which contain the IBM 1.4.2 SR13-FP6 Java release. All running
instances of IBM Java must be restarted for this update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Server 3 x86_64
  • Red Hat Enterprise Linux Server 3 ia64
  • Red Hat Enterprise Linux Server 3 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4ES x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4ES ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4ES i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4AS x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4AS ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 4AS i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Workstation 3 x86_64
  • Red Hat Enterprise Linux Workstation 3 ia64
  • Red Hat Enterprise Linux Workstation 3 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux Desktop 3 x86_64
  • Red Hat Enterprise Linux Desktop 3 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for IBM z Systems 3 s390x
  • Red Hat Enterprise Linux for IBM z Systems 3 s390
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4AS s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4AS s390
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian 4 ppc
  • Red Hat Enterprise Linux for Power, big endian 3 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4AS ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 533125 - CVE-2009-3555 TLS: MITM attacks via session renegotiation
  • BZ - 639876 - CVE-2010-3568 OpenJDK Deserialization Race condition (6559775)
  • BZ - 639897 - CVE-2010-3562 OpenJDK IndexColorModel double-free (6925710)
  • BZ - 639904 - CVE-2010-3557 OpenJDK Swing mutable static (6938813)
  • BZ - 639909 - CVE-2010-3548 OpenJDK DNS server IP address information leak (6957564)
  • BZ - 639920 - CVE-2010-3565 OpenJDK JPEG writeImage remote code execution (6963023)
  • BZ - 639925 - CVE-2010-3569 OpenJDK Serialization inconsistencies (6966692)
  • BZ - 642167 - CVE-2010-3553 OpenJDK Swing unsafe reflection usage (6622002)
  • BZ - 642180 - CVE-2010-3549 OpenJDK HttpURLConnection request splitting (6952017)
  • BZ - 642187 - CVE-2010-3551 OpenJDK local network address disclosure (6952603)
  • BZ - 642202 - CVE-2010-3541 CVE-2010-3573 OpenJDK HttpURLConnection allows arbitrary request headers (6961084,6980004)
  • BZ - 642576 - CVE-2010-3556 JDK unspecified vulnerability in 2D component
  • BZ - 642585 - CVE-2010-3571 JDK unspecified vulnerability in 2D component
  • BZ - 642611 - CVE-2010-3572 JDK unspecified vulnerability in Sound component

CVEs

  • CVE-2009-3555
  • CVE-2010-3565
  • CVE-2010-3557
  • CVE-2010-3562
  • CVE-2010-3541
  • CVE-2010-3568
  • CVE-2010-3569
  • CVE-2010-3553
  • CVE-2010-3551
  • CVE-2010-3548
  • CVE-2010-3549
  • CVE-2010-3571
  • CVE-2010-3556
  • CVE-2010-3572

References

  • http://www.redhat.com/security/updates/classification/#critical
  • http://www.ibm.com/developerworks/java/jdk/alerts/
  • https://access.redhat.com/kb/docs/DOC-20491
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
x86_64
java-1.4.2-ibm-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: dc692f05c47919ba1757c0f5345aa02c907638ec8c4d6125a0328f32c4e7a240
java-1.4.2-ibm-1.4.2.13.6-1jpp.2.el5.x86_64.rpm SHA-256: f83e66c2d206cebaed536aea0efadfa34c5a546521ef59d1ca1596d00396858c
java-1.4.2-ibm-demo-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: efd93ae748ef7558663309cbabae01a3d2c45db98608bf03ced0493ed2fc7dea
java-1.4.2-ibm-demo-1.4.2.13.6-1jpp.2.el5.x86_64.rpm SHA-256: 8bb74dca08e61c7aa5b269a5a17d23adf1374d27cc31b66532310931cae3be97
java-1.4.2-ibm-devel-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 01408aecba7fec0717b9e5f7b9968c74e9985cb0edb5b625bcf811f02e238ff7
java-1.4.2-ibm-devel-1.4.2.13.6-1jpp.2.el5.x86_64.rpm SHA-256: 3ab276b905fb1302f70db4f3a9b72cf1e41a1486898fa064ef6ceda6d092297e
java-1.4.2-ibm-javacomm-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 7bb1cc6ad25981d3fbbf9f31832e832303814f393a162b060bf00c5b30658248
java-1.4.2-ibm-javacomm-1.4.2.13.6-1jpp.2.el5.x86_64.rpm SHA-256: 6f1ede44e00fc0a105d281cca212ec1e70338e77190a6fe71c104ebfd6569f96
java-1.4.2-ibm-jdbc-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: f7ead7aadeb0ddd713efc09a519c39cc133f8fc8e410f4f5fa7eddd8a3dc663d
java-1.4.2-ibm-plugin-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 51ea1f08c36b72800f364c63ce56206c93698bebca828cce52306f21329e32aa
java-1.4.2-ibm-src-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 8d7130b81fa46748c1973b65d1aca73527d0e8048655cd5f049ebfbe707f5abc
java-1.4.2-ibm-src-1.4.2.13.6-1jpp.2.el5.x86_64.rpm SHA-256: 45b7c697b0b218872c567a3bf415f4d70b19c480c8194248b4932a4f3d0c961b
ia64
java-1.4.2-ibm-1.4.2.13.6-1jpp.2.el5.ia64.rpm SHA-256: 21e8b4628476ead367468e30d8210c6f38d8260edb81635f62c0abe4d17c72c9
java-1.4.2-ibm-demo-1.4.2.13.6-1jpp.2.el5.ia64.rpm SHA-256: da045be19977d499d2bd792ec645149feb7cc4616a47ef4e91bad8eb18759f86
java-1.4.2-ibm-devel-1.4.2.13.6-1jpp.2.el5.ia64.rpm SHA-256: b0831709773b9ce98bb18e8afa2cff30fc4494cb0f35322cd480deefc0809edd
java-1.4.2-ibm-src-1.4.2.13.6-1jpp.2.el5.ia64.rpm SHA-256: a19695c71de30c7a6f12db85afe055cf7d9516f49e06a80a467732eb49396789
i386
java-1.4.2-ibm-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: dc692f05c47919ba1757c0f5345aa02c907638ec8c4d6125a0328f32c4e7a240
java-1.4.2-ibm-demo-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: efd93ae748ef7558663309cbabae01a3d2c45db98608bf03ced0493ed2fc7dea
java-1.4.2-ibm-devel-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 01408aecba7fec0717b9e5f7b9968c74e9985cb0edb5b625bcf811f02e238ff7
java-1.4.2-ibm-javacomm-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 7bb1cc6ad25981d3fbbf9f31832e832303814f393a162b060bf00c5b30658248
java-1.4.2-ibm-jdbc-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: f7ead7aadeb0ddd713efc09a519c39cc133f8fc8e410f4f5fa7eddd8a3dc663d
java-1.4.2-ibm-plugin-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 51ea1f08c36b72800f364c63ce56206c93698bebca828cce52306f21329e32aa
java-1.4.2-ibm-src-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 8d7130b81fa46748c1973b65d1aca73527d0e8048655cd5f049ebfbe707f5abc

Red Hat Enterprise Linux Server 4

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Server 3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4ES

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux for x86_64 - Extended Update Support 4AS

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 5

SRPM
x86_64
java-1.4.2-ibm-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: dc692f05c47919ba1757c0f5345aa02c907638ec8c4d6125a0328f32c4e7a240
java-1.4.2-ibm-1.4.2.13.6-1jpp.2.el5.x86_64.rpm SHA-256: f83e66c2d206cebaed536aea0efadfa34c5a546521ef59d1ca1596d00396858c
java-1.4.2-ibm-demo-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: efd93ae748ef7558663309cbabae01a3d2c45db98608bf03ced0493ed2fc7dea
java-1.4.2-ibm-demo-1.4.2.13.6-1jpp.2.el5.x86_64.rpm SHA-256: 8bb74dca08e61c7aa5b269a5a17d23adf1374d27cc31b66532310931cae3be97
java-1.4.2-ibm-devel-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 01408aecba7fec0717b9e5f7b9968c74e9985cb0edb5b625bcf811f02e238ff7
java-1.4.2-ibm-devel-1.4.2.13.6-1jpp.2.el5.x86_64.rpm SHA-256: 3ab276b905fb1302f70db4f3a9b72cf1e41a1486898fa064ef6ceda6d092297e
java-1.4.2-ibm-javacomm-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 7bb1cc6ad25981d3fbbf9f31832e832303814f393a162b060bf00c5b30658248
java-1.4.2-ibm-javacomm-1.4.2.13.6-1jpp.2.el5.x86_64.rpm SHA-256: 6f1ede44e00fc0a105d281cca212ec1e70338e77190a6fe71c104ebfd6569f96
java-1.4.2-ibm-jdbc-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: f7ead7aadeb0ddd713efc09a519c39cc133f8fc8e410f4f5fa7eddd8a3dc663d
java-1.4.2-ibm-plugin-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 51ea1f08c36b72800f364c63ce56206c93698bebca828cce52306f21329e32aa
java-1.4.2-ibm-src-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 8d7130b81fa46748c1973b65d1aca73527d0e8048655cd5f049ebfbe707f5abc
java-1.4.2-ibm-src-1.4.2.13.6-1jpp.2.el5.x86_64.rpm SHA-256: 45b7c697b0b218872c567a3bf415f4d70b19c480c8194248b4932a4f3d0c961b
i386
java-1.4.2-ibm-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: dc692f05c47919ba1757c0f5345aa02c907638ec8c4d6125a0328f32c4e7a240
java-1.4.2-ibm-demo-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: efd93ae748ef7558663309cbabae01a3d2c45db98608bf03ced0493ed2fc7dea
java-1.4.2-ibm-devel-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 01408aecba7fec0717b9e5f7b9968c74e9985cb0edb5b625bcf811f02e238ff7
java-1.4.2-ibm-javacomm-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 7bb1cc6ad25981d3fbbf9f31832e832303814f393a162b060bf00c5b30658248
java-1.4.2-ibm-jdbc-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: f7ead7aadeb0ddd713efc09a519c39cc133f8fc8e410f4f5fa7eddd8a3dc663d
java-1.4.2-ibm-plugin-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 51ea1f08c36b72800f364c63ce56206c93698bebca828cce52306f21329e32aa
java-1.4.2-ibm-src-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 8d7130b81fa46748c1973b65d1aca73527d0e8048655cd5f049ebfbe707f5abc

Red Hat Enterprise Linux Workstation 4

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Workstation 3

SRPM
x86_64
ia64
i386

Red Hat Enterprise Linux Desktop 5

SRPM
x86_64
java-1.4.2-ibm-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: dc692f05c47919ba1757c0f5345aa02c907638ec8c4d6125a0328f32c4e7a240
java-1.4.2-ibm-1.4.2.13.6-1jpp.2.el5.x86_64.rpm SHA-256: f83e66c2d206cebaed536aea0efadfa34c5a546521ef59d1ca1596d00396858c
java-1.4.2-ibm-demo-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: efd93ae748ef7558663309cbabae01a3d2c45db98608bf03ced0493ed2fc7dea
java-1.4.2-ibm-demo-1.4.2.13.6-1jpp.2.el5.x86_64.rpm SHA-256: 8bb74dca08e61c7aa5b269a5a17d23adf1374d27cc31b66532310931cae3be97
java-1.4.2-ibm-devel-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 01408aecba7fec0717b9e5f7b9968c74e9985cb0edb5b625bcf811f02e238ff7
java-1.4.2-ibm-devel-1.4.2.13.6-1jpp.2.el5.x86_64.rpm SHA-256: 3ab276b905fb1302f70db4f3a9b72cf1e41a1486898fa064ef6ceda6d092297e
java-1.4.2-ibm-javacomm-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 7bb1cc6ad25981d3fbbf9f31832e832303814f393a162b060bf00c5b30658248
java-1.4.2-ibm-javacomm-1.4.2.13.6-1jpp.2.el5.x86_64.rpm SHA-256: 6f1ede44e00fc0a105d281cca212ec1e70338e77190a6fe71c104ebfd6569f96
java-1.4.2-ibm-jdbc-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: f7ead7aadeb0ddd713efc09a519c39cc133f8fc8e410f4f5fa7eddd8a3dc663d
java-1.4.2-ibm-plugin-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 51ea1f08c36b72800f364c63ce56206c93698bebca828cce52306f21329e32aa
java-1.4.2-ibm-src-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 8d7130b81fa46748c1973b65d1aca73527d0e8048655cd5f049ebfbe707f5abc
java-1.4.2-ibm-src-1.4.2.13.6-1jpp.2.el5.x86_64.rpm SHA-256: 45b7c697b0b218872c567a3bf415f4d70b19c480c8194248b4932a4f3d0c961b
i386
java-1.4.2-ibm-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: dc692f05c47919ba1757c0f5345aa02c907638ec8c4d6125a0328f32c4e7a240
java-1.4.2-ibm-demo-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: efd93ae748ef7558663309cbabae01a3d2c45db98608bf03ced0493ed2fc7dea
java-1.4.2-ibm-devel-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 01408aecba7fec0717b9e5f7b9968c74e9985cb0edb5b625bcf811f02e238ff7
java-1.4.2-ibm-javacomm-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 7bb1cc6ad25981d3fbbf9f31832e832303814f393a162b060bf00c5b30658248
java-1.4.2-ibm-jdbc-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: f7ead7aadeb0ddd713efc09a519c39cc133f8fc8e410f4f5fa7eddd8a3dc663d
java-1.4.2-ibm-plugin-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 51ea1f08c36b72800f364c63ce56206c93698bebca828cce52306f21329e32aa
java-1.4.2-ibm-src-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 8d7130b81fa46748c1973b65d1aca73527d0e8048655cd5f049ebfbe707f5abc

Red Hat Enterprise Linux Desktop 4

SRPM
x86_64
i386

Red Hat Enterprise Linux Desktop 3

SRPM
x86_64
i386

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
s390x
java-1.4.2-ibm-1.4.2.13.6-1jpp.2.el5.s390.rpm SHA-256: a1d5b29f63d868a64f867c27d3fcc254bba02213f8fc3ea74e30251fa0157ae4
java-1.4.2-ibm-1.4.2.13.6-1jpp.2.el5.s390x.rpm SHA-256: 0d2c4f72eb9c8d58cc1df4ebb5870d07d2141641df7dd0ec7e909bb8e1a6bad6
java-1.4.2-ibm-demo-1.4.2.13.6-1jpp.2.el5.s390.rpm SHA-256: e5406d7882f7fec179e59bb9d7e28c8b19e18c985973ea7e0f7f39be86c7ad5d
java-1.4.2-ibm-demo-1.4.2.13.6-1jpp.2.el5.s390x.rpm SHA-256: 6f7b3150d2086de9150911244c605dbec059e4cac2e5e57269722e66849f49dd
java-1.4.2-ibm-devel-1.4.2.13.6-1jpp.2.el5.s390.rpm SHA-256: cb95e10cc2c97b01b15ebe0be6b6b85ea93ac6ad13189709fdaf412d33bf51ff
java-1.4.2-ibm-devel-1.4.2.13.6-1jpp.2.el5.s390x.rpm SHA-256: 545d37bc487870a77ba1d723b4871f80c02b2525dcc3e623438c86a2911e7f85
java-1.4.2-ibm-jdbc-1.4.2.13.6-1jpp.2.el5.s390.rpm SHA-256: 7fd988f084c6ae76cc9885d2b31d6b748771a91ff0f4aac17578c3fd24224ab3
java-1.4.2-ibm-src-1.4.2.13.6-1jpp.2.el5.s390.rpm SHA-256: 534cbccf866b62edbdd52501b4ca0066fa1763502fdb733d9396642bdf821d0c
java-1.4.2-ibm-src-1.4.2.13.6-1jpp.2.el5.s390x.rpm SHA-256: c563995ff1eb4daa1909ac9fd34d688fd265a8fc108fe7ef68be91a40b8b1502

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
s390x
s390

Red Hat Enterprise Linux for IBM z Systems 3

SRPM
s390x
s390

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 4AS

SRPM
s390x
s390

Red Hat Enterprise Linux for Power, big endian 5

SRPM
ppc
java-1.4.2-ibm-1.4.2.13.6-1jpp.2.el5.ppc.rpm SHA-256: 343785d8e52721a50fd8628951720f2257ee7e5212b85003129f96e396b808d7
java-1.4.2-ibm-1.4.2.13.6-1jpp.2.el5.ppc64.rpm SHA-256: bf1f035158a52e7927365773cf5dcb27be854a8bbb18f2b200a900723b556f74
java-1.4.2-ibm-demo-1.4.2.13.6-1jpp.2.el5.ppc.rpm SHA-256: 145a7f79bff8dd934188bb6ad71e50c8dff8e2160e50e1c2a4c7b1305e829f15
java-1.4.2-ibm-demo-1.4.2.13.6-1jpp.2.el5.ppc64.rpm SHA-256: f84157c5a7703c1f5a1087cef414fd05e8bfc579f63bac8accd74af64da33191
java-1.4.2-ibm-devel-1.4.2.13.6-1jpp.2.el5.ppc.rpm SHA-256: 5d95dd9773a5fd5bb8cc8080bc3c4db09a90c71c9afae4942c1abf180f7ae69b
java-1.4.2-ibm-devel-1.4.2.13.6-1jpp.2.el5.ppc64.rpm SHA-256: 9df03524409872597cec4d4a6e3b5df0ed888c41a1c1a64400aa71b64fa29953
java-1.4.2-ibm-javacomm-1.4.2.13.6-1jpp.2.el5.ppc.rpm SHA-256: 18fbd340084ea8c669cb0ff6ac6901d50293987ac9ff27632cecc59a3a4394c6
java-1.4.2-ibm-javacomm-1.4.2.13.6-1jpp.2.el5.ppc64.rpm SHA-256: 6c7b8209b33ab262dca220bf875badc63209ba5e510607d27aacd21fa30f4172
java-1.4.2-ibm-jdbc-1.4.2.13.6-1jpp.2.el5.ppc.rpm SHA-256: f6df22df011819f957c3b2585e63ee3be1fec9e620f6dcf15f9207c13ff8cad3
java-1.4.2-ibm-src-1.4.2.13.6-1jpp.2.el5.ppc.rpm SHA-256: 4fd462ec7591010c6d78e279084af15bd73347dd4d97bc4db26e273d81e8896d
java-1.4.2-ibm-src-1.4.2.13.6-1jpp.2.el5.ppc64.rpm SHA-256: 6072b1aa1b5fe000c7b4c729c390462449eb566ebd6aeda3a3664c675d12bdf2

Red Hat Enterprise Linux for Power, big endian 4

SRPM
ppc

Red Hat Enterprise Linux for Power, big endian 3

SRPM
ppc

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 4AS

SRPM
ppc

Red Hat Enterprise Linux Server from RHUI 5

SRPM
x86_64
java-1.4.2-ibm-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: dc692f05c47919ba1757c0f5345aa02c907638ec8c4d6125a0328f32c4e7a240
java-1.4.2-ibm-1.4.2.13.6-1jpp.2.el5.x86_64.rpm SHA-256: f83e66c2d206cebaed536aea0efadfa34c5a546521ef59d1ca1596d00396858c
java-1.4.2-ibm-demo-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: efd93ae748ef7558663309cbabae01a3d2c45db98608bf03ced0493ed2fc7dea
java-1.4.2-ibm-demo-1.4.2.13.6-1jpp.2.el5.x86_64.rpm SHA-256: 8bb74dca08e61c7aa5b269a5a17d23adf1374d27cc31b66532310931cae3be97
java-1.4.2-ibm-devel-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 01408aecba7fec0717b9e5f7b9968c74e9985cb0edb5b625bcf811f02e238ff7
java-1.4.2-ibm-devel-1.4.2.13.6-1jpp.2.el5.x86_64.rpm SHA-256: 3ab276b905fb1302f70db4f3a9b72cf1e41a1486898fa064ef6ceda6d092297e
java-1.4.2-ibm-javacomm-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 7bb1cc6ad25981d3fbbf9f31832e832303814f393a162b060bf00c5b30658248
java-1.4.2-ibm-javacomm-1.4.2.13.6-1jpp.2.el5.x86_64.rpm SHA-256: 6f1ede44e00fc0a105d281cca212ec1e70338e77190a6fe71c104ebfd6569f96
java-1.4.2-ibm-jdbc-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: f7ead7aadeb0ddd713efc09a519c39cc133f8fc8e410f4f5fa7eddd8a3dc663d
java-1.4.2-ibm-plugin-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 51ea1f08c36b72800f364c63ce56206c93698bebca828cce52306f21329e32aa
java-1.4.2-ibm-src-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 8d7130b81fa46748c1973b65d1aca73527d0e8048655cd5f049ebfbe707f5abc
java-1.4.2-ibm-src-1.4.2.13.6-1jpp.2.el5.x86_64.rpm SHA-256: 45b7c697b0b218872c567a3bf415f4d70b19c480c8194248b4932a4f3d0c961b
i386
java-1.4.2-ibm-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: dc692f05c47919ba1757c0f5345aa02c907638ec8c4d6125a0328f32c4e7a240
java-1.4.2-ibm-demo-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: efd93ae748ef7558663309cbabae01a3d2c45db98608bf03ced0493ed2fc7dea
java-1.4.2-ibm-devel-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 01408aecba7fec0717b9e5f7b9968c74e9985cb0edb5b625bcf811f02e238ff7
java-1.4.2-ibm-javacomm-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 7bb1cc6ad25981d3fbbf9f31832e832303814f393a162b060bf00c5b30658248
java-1.4.2-ibm-jdbc-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: f7ead7aadeb0ddd713efc09a519c39cc133f8fc8e410f4f5fa7eddd8a3dc663d
java-1.4.2-ibm-plugin-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 51ea1f08c36b72800f364c63ce56206c93698bebca828cce52306f21329e32aa
java-1.4.2-ibm-src-1.4.2.13.6-1jpp.2.el5.i386.rpm SHA-256: 8d7130b81fa46748c1973b65d1aca73527d0e8048655cd5f049ebfbe707f5abc

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility