Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
Red Hat Logo Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Tower
      • Red Hat Ansible Engine
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat Cloud Infrastructure
      • Red Hat Cloud Suite
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat OpenShift Application Runtimes
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • JBoss Development and Management
      • Back
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat JBoss Data Grid
      • Red Hat JBoss Web Server
      • Red Hat JBoss Operations Network
      • Red Hat Developer Studio
    • JBoss Integration and Automation
      • Back
      • Red Hat JBoss Data Virtualization
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
      • Red Hat 3scale API Management
    • Mobile
      • Back
      • Red Hat Mobile Application Platform
    • Support
    • Production Support
    • Development Support
    • Product Life Cycle & Update Policies
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem
    • Browse Certified Solutions
    • Partner Resources
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • Español
    • Deutsch
    • Italiano
    • 한국어
    • Français
    • 日本語
    • Português
    • 中文 (中国)
    • русский
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Troubleshooting an issue? Try Solution Engine—our new support tool.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • Español
  • Deutsch
  • Italiano
  • 한국어
  • Français
  • 日本語
  • Português
  • 中文 (中国)
  • русский
Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • JBoss Development and Management

  • JBoss Integration and Automation

  • Mobile

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Tower
  • Red Hat Ansible Engine
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat Cloud Infrastructure
  • Red Hat Cloud Suite
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat OpenShift Application Runtimes
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat JBoss Data Grid
  • Red Hat JBoss Web Server
  • Red Hat JBoss Operations Network
  • Red Hat Developer Studio
  • Red Hat JBoss Data Virtualization
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
  • Red Hat 3scale API Management
  • Red Hat Mobile Application Platform
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycle & Update Policies

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem
  • Browse Certified Solutions
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting
  • Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses for high-priority security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Red Hat Product Errata RHSA-2012:1384 - Security Advisory
Issued:
2012-10-17
Updated:
2012-10-17

RHSA-2012:1384 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Critical: java-1.6.0-openjdk security update

Type/Severity

Security Advisory: Critical

Topic

Updated java-1.6.0-openjdk packages that fix several security issues are
now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

These packages provide the OpenJDK 6 Java Runtime Environment and the
OpenJDK 6 Software Development Kit.

Multiple improper permission check issues were discovered in the Beans,
Swing, and JMX components in OpenJDK. An untrusted Java application or
applet could use these flaws to bypass Java sandbox restrictions.
(CVE-2012-5086, CVE-2012-5084, CVE-2012-5089)

Multiple improper permission check issues were discovered in the Scripting,
JMX, Concurrency, Libraries, and Security components in OpenJDK. An
untrusted Java application or applet could use these flaws to bypass
certain Java sandbox restrictions. (CVE-2012-5068, CVE-2012-5071,
CVE-2012-5069, CVE-2012-5073, CVE-2012-5072)

It was discovered that java.util.ServiceLoader could create an instance of
an incompatible class while performing provider lookup. An untrusted Java
application or applet could use this flaw to bypass certain Java sandbox
restrictions. (CVE-2012-5079)

It was discovered that the Java Secure Socket Extension (JSSE) SSL/TLS
implementation did not properly handle handshake records containing an
overly large data length value. An unauthenticated, remote attacker could
possibly use this flaw to cause an SSL/TLS server to terminate with an
exception. (CVE-2012-5081)

It was discovered that the JMX component in OpenJDK could perform certain
actions in an insecure manner. An untrusted Java application or applet
could possibly use this flaw to disclose sensitive information.
(CVE-2012-5075)

A bug in the Java HotSpot Virtual Machine optimization code could cause it
to not perform array initialization in certain cases. An untrusted Java
application or applet could use this flaw to disclose portions of the
virtual machine's memory. (CVE-2012-4416)

It was discovered that the SecureRandom class did not properly protect
against the creation of multiple seeders. An untrusted Java application or
applet could possibly use this flaw to disclose sensitive information.
(CVE-2012-5077)

It was discovered that the java.io.FilePermission class exposed the hash
code of the canonicalized path name. An untrusted Java application or
applet could possibly use this flaw to determine certain system paths, such
as the current working directory. (CVE-2012-3216)

This update disables Gopher protocol support in the java.net package by
default. Gopher support can be enabled by setting the newly introduced
property, "jdk.net.registerGopherProtocol", to true. (CVE-2012-5085)

Note: If the web browser plug-in provided by the icedtea-web package was
installed, the issues exposed via Java applets could have been exploited
without user interaction if a user visited a malicious website.

This erratum also upgrades the OpenJDK package to IcedTea6 1.11.5. Refer to
the NEWS file, linked to in the References, for further information.

All users of java-1.6.0-openjdk are advised to upgrade to these updated
packages, which resolve these issues. All running instances of OpenJDK Java
must be restarted for the update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux Server - Extended Update Support 6.3 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support 6.3 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3 i386

Fixes

  • BZ - 856124 - CVE-2012-4416 OpenJDK: uninitialized Array JVM memory disclosure (Hotspot, 7198606)
  • BZ - 865346 - CVE-2012-3216 OpenJDK: java.io.FilePermission information leak (Libraries, 6631398)
  • BZ - 865348 - CVE-2012-5068 OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535)
  • BZ - 865354 - CVE-2012-5077 OpenJDK: SecureRandom mulitple seeders information disclosure (Security, 7167656)
  • BZ - 865357 - CVE-2012-5073 OpenJDK: LogManager security bypass (Libraries, 7169884)
  • BZ - 865363 - CVE-2012-5075 OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888)
  • BZ - 865365 - CVE-2012-5072 OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522)
  • BZ - 865370 - CVE-2012-5081 OpenJDK: JSSE denial of service (JSSE, 7186286)
  • BZ - 865428 - CVE-2012-5086 OpenJDK: XMLDecoder sandbox restriction bypass (Beans, 7195917)
  • BZ - 865511 - CVE-2012-5084 OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194)
  • BZ - 865514 - CVE-2012-5089 OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296)
  • BZ - 865519 - CVE-2012-5071 OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975)
  • BZ - 865531 - CVE-2012-5069 OpenJDK: Executors state handling issues (Concurrency, 7189103)
  • BZ - 865541 - CVE-2012-5085 OpenJDK: disable Gopher support by default (Gopher, 7189567)
  • BZ - 865568 - CVE-2012-5079 OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919)

CVEs

  • CVE-2012-5084
  • CVE-2012-4416
  • CVE-2012-5085
  • CVE-2012-5079
  • CVE-2012-5086
  • CVE-2012-5081
  • CVE-2012-5069
  • CVE-2012-5068
  • CVE-2012-3216
  • CVE-2012-5071
  • CVE-2012-5072
  • CVE-2012-5073
  • CVE-2012-5089
  • CVE-2012-5075
  • CVE-2012-5077

References

  • https://access.redhat.com/security/updates/classification/#critical
  • http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.5/NEWS
  • http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.src.rpm SHA-256: f785905a3d9142333074f280eedcf51a4fd1d97622b2ba4a08d0011a2afa401f
x86_64
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: e6e79e13e74e9fa0fb20656264a4943fe5b590e9a1e30f688b985be9c8b34e30
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: acef011ab841214213395170bf0534281e07bdd05f0fc3bd44621569b1aef7fc
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: dfe7609c157346f4edf0384e5509e7593e3640701eb0ea696ce4e76488a6c59f
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 56fd0380b5c1085486aa95191fef1292026216944e7e83a6bc8a9785c01fdf16
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 39b46193e17c44f5e4eeecd7095b18e45f505a09b83941cc4d04ef574517278d
i386
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: bcd43644a3af691417161813d1654a672a29a0429e4df175b9fd9102d9117944
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: b6da99e08b1e88295deca27dc25ac33651b7ec90a385ad2353fd8467464f347a
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: a9c72ed1d2501591c41469d6b594c0ab3155fb2ee9f6505ee9d2193986cdcdf8
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 132b1f160532cf16cb5b058e26b372359b1a0c8c23ff395bbfd8053c9bf318af
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 221ed19c7038907abfd9c335d2802461ad61e3579aad36a36a302833cfa4b114

Red Hat Enterprise Linux Server - Extended Update Support 6.3

SRPM
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.src.rpm SHA-256: f785905a3d9142333074f280eedcf51a4fd1d97622b2ba4a08d0011a2afa401f
x86_64
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: e6e79e13e74e9fa0fb20656264a4943fe5b590e9a1e30f688b985be9c8b34e30
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: acef011ab841214213395170bf0534281e07bdd05f0fc3bd44621569b1aef7fc
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: dfe7609c157346f4edf0384e5509e7593e3640701eb0ea696ce4e76488a6c59f
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 56fd0380b5c1085486aa95191fef1292026216944e7e83a6bc8a9785c01fdf16
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 39b46193e17c44f5e4eeecd7095b18e45f505a09b83941cc4d04ef574517278d
i386
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: bcd43644a3af691417161813d1654a672a29a0429e4df175b9fd9102d9117944
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: b6da99e08b1e88295deca27dc25ac33651b7ec90a385ad2353fd8467464f347a
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: a9c72ed1d2501591c41469d6b594c0ab3155fb2ee9f6505ee9d2193986cdcdf8
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 132b1f160532cf16cb5b058e26b372359b1a0c8c23ff395bbfd8053c9bf318af
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 221ed19c7038907abfd9c335d2802461ad61e3579aad36a36a302833cfa4b114

Red Hat Enterprise Linux Workstation 6

SRPM
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.src.rpm SHA-256: f785905a3d9142333074f280eedcf51a4fd1d97622b2ba4a08d0011a2afa401f
x86_64
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: e6e79e13e74e9fa0fb20656264a4943fe5b590e9a1e30f688b985be9c8b34e30
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: acef011ab841214213395170bf0534281e07bdd05f0fc3bd44621569b1aef7fc
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: dfe7609c157346f4edf0384e5509e7593e3640701eb0ea696ce4e76488a6c59f
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 56fd0380b5c1085486aa95191fef1292026216944e7e83a6bc8a9785c01fdf16
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 39b46193e17c44f5e4eeecd7095b18e45f505a09b83941cc4d04ef574517278d
i386
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: bcd43644a3af691417161813d1654a672a29a0429e4df175b9fd9102d9117944
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: b6da99e08b1e88295deca27dc25ac33651b7ec90a385ad2353fd8467464f347a
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: a9c72ed1d2501591c41469d6b594c0ab3155fb2ee9f6505ee9d2193986cdcdf8
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 132b1f160532cf16cb5b058e26b372359b1a0c8c23ff395bbfd8053c9bf318af
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 221ed19c7038907abfd9c335d2802461ad61e3579aad36a36a302833cfa4b114

Red Hat Enterprise Linux Desktop 6

SRPM
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.src.rpm SHA-256: f785905a3d9142333074f280eedcf51a4fd1d97622b2ba4a08d0011a2afa401f
x86_64
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: e6e79e13e74e9fa0fb20656264a4943fe5b590e9a1e30f688b985be9c8b34e30
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: acef011ab841214213395170bf0534281e07bdd05f0fc3bd44621569b1aef7fc
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: dfe7609c157346f4edf0384e5509e7593e3640701eb0ea696ce4e76488a6c59f
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 56fd0380b5c1085486aa95191fef1292026216944e7e83a6bc8a9785c01fdf16
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 39b46193e17c44f5e4eeecd7095b18e45f505a09b83941cc4d04ef574517278d
i386
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: bcd43644a3af691417161813d1654a672a29a0429e4df175b9fd9102d9117944
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: b6da99e08b1e88295deca27dc25ac33651b7ec90a385ad2353fd8467464f347a
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: a9c72ed1d2501591c41469d6b594c0ab3155fb2ee9f6505ee9d2193986cdcdf8
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 132b1f160532cf16cb5b058e26b372359b1a0c8c23ff395bbfd8053c9bf318af
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 221ed19c7038907abfd9c335d2802461ad61e3579aad36a36a302833cfa4b114

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.src.rpm SHA-256: f785905a3d9142333074f280eedcf51a4fd1d97622b2ba4a08d0011a2afa401f
x86_64
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: e6e79e13e74e9fa0fb20656264a4943fe5b590e9a1e30f688b985be9c8b34e30
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: acef011ab841214213395170bf0534281e07bdd05f0fc3bd44621569b1aef7fc
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: dfe7609c157346f4edf0384e5509e7593e3640701eb0ea696ce4e76488a6c59f
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 56fd0380b5c1085486aa95191fef1292026216944e7e83a6bc8a9785c01fdf16
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 39b46193e17c44f5e4eeecd7095b18e45f505a09b83941cc4d04ef574517278d

Red Hat Enterprise Linux Server from RHUI 6

SRPM
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.src.rpm SHA-256: f785905a3d9142333074f280eedcf51a4fd1d97622b2ba4a08d0011a2afa401f
x86_64
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: e6e79e13e74e9fa0fb20656264a4943fe5b590e9a1e30f688b985be9c8b34e30
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: acef011ab841214213395170bf0534281e07bdd05f0fc3bd44621569b1aef7fc
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: dfe7609c157346f4edf0384e5509e7593e3640701eb0ea696ce4e76488a6c59f
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 56fd0380b5c1085486aa95191fef1292026216944e7e83a6bc8a9785c01fdf16
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 39b46193e17c44f5e4eeecd7095b18e45f505a09b83941cc4d04ef574517278d
i386
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: bcd43644a3af691417161813d1654a672a29a0429e4df175b9fd9102d9117944
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: b6da99e08b1e88295deca27dc25ac33651b7ec90a385ad2353fd8467464f347a
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: a9c72ed1d2501591c41469d6b594c0ab3155fb2ee9f6505ee9d2193986cdcdf8
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 132b1f160532cf16cb5b058e26b372359b1a0c8c23ff395bbfd8053c9bf318af
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 221ed19c7038907abfd9c335d2802461ad61e3579aad36a36a302833cfa4b114

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3

SRPM
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.src.rpm SHA-256: f785905a3d9142333074f280eedcf51a4fd1d97622b2ba4a08d0011a2afa401f
x86_64
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: e6e79e13e74e9fa0fb20656264a4943fe5b590e9a1e30f688b985be9c8b34e30
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: dfe7609c157346f4edf0384e5509e7593e3640701eb0ea696ce4e76488a6c59f
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 56fd0380b5c1085486aa95191fef1292026216944e7e83a6bc8a9785c01fdf16
i386
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: bcd43644a3af691417161813d1654a672a29a0429e4df175b9fd9102d9117944
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: a9c72ed1d2501591c41469d6b594c0ab3155fb2ee9f6505ee9d2193986cdcdf8
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 132b1f160532cf16cb5b058e26b372359b1a0c8c23ff395bbfd8053c9bf318af

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2018 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook Google+