Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2012:1384 - Security Advisory
Issued:
2012-10-17
Updated:
2012-10-17

RHSA-2012:1384 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Critical: java-1.6.0-openjdk security update

Type/Severity

Security Advisory: Critical

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated java-1.6.0-openjdk packages that fix several security issues are
now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having critical
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

Description

These packages provide the OpenJDK 6 Java Runtime Environment and the
OpenJDK 6 Software Development Kit.

Multiple improper permission check issues were discovered in the Beans,
Swing, and JMX components in OpenJDK. An untrusted Java application or
applet could use these flaws to bypass Java sandbox restrictions.
(CVE-2012-5086, CVE-2012-5084, CVE-2012-5089)

Multiple improper permission check issues were discovered in the Scripting,
JMX, Concurrency, Libraries, and Security components in OpenJDK. An
untrusted Java application or applet could use these flaws to bypass
certain Java sandbox restrictions. (CVE-2012-5068, CVE-2012-5071,
CVE-2012-5069, CVE-2012-5073, CVE-2012-5072)

It was discovered that java.util.ServiceLoader could create an instance of
an incompatible class while performing provider lookup. An untrusted Java
application or applet could use this flaw to bypass certain Java sandbox
restrictions. (CVE-2012-5079)

It was discovered that the Java Secure Socket Extension (JSSE) SSL/TLS
implementation did not properly handle handshake records containing an
overly large data length value. An unauthenticated, remote attacker could
possibly use this flaw to cause an SSL/TLS server to terminate with an
exception. (CVE-2012-5081)

It was discovered that the JMX component in OpenJDK could perform certain
actions in an insecure manner. An untrusted Java application or applet
could possibly use this flaw to disclose sensitive information.
(CVE-2012-5075)

A bug in the Java HotSpot Virtual Machine optimization code could cause it
to not perform array initialization in certain cases. An untrusted Java
application or applet could use this flaw to disclose portions of the
virtual machine's memory. (CVE-2012-4416)

It was discovered that the SecureRandom class did not properly protect
against the creation of multiple seeders. An untrusted Java application or
applet could possibly use this flaw to disclose sensitive information.
(CVE-2012-5077)

It was discovered that the java.io.FilePermission class exposed the hash
code of the canonicalized path name. An untrusted Java application or
applet could possibly use this flaw to determine certain system paths, such
as the current working directory. (CVE-2012-3216)

This update disables Gopher protocol support in the java.net package by
default. Gopher support can be enabled by setting the newly introduced
property, "jdk.net.registerGopherProtocol", to true. (CVE-2012-5085)

Note: If the web browser plug-in provided by the icedtea-web package was
installed, the issues exposed via Java applets could have been exploited
without user interaction if a user visited a malicious website.

This erratum also upgrades the OpenJDK package to IcedTea6 1.11.5. Refer to
the NEWS file, linked to in the References, for further information.

All users of java-1.6.0-openjdk are advised to upgrade to these updated
packages, which resolve these issues. All running instances of OpenJDK Java
must be restarted for the update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386

Fixes

  • BZ - 856124 - CVE-2012-4416 OpenJDK: uninitialized Array JVM memory disclosure (Hotspot, 7198606)
  • BZ - 865346 - CVE-2012-3216 OpenJDK: java.io.FilePermission information leak (Libraries, 6631398)
  • BZ - 865348 - CVE-2012-5068 OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535)
  • BZ - 865354 - CVE-2012-5077 OpenJDK: SecureRandom mulitple seeders information disclosure (Security, 7167656)
  • BZ - 865357 - CVE-2012-5073 OpenJDK: LogManager security bypass (Libraries, 7169884)
  • BZ - 865363 - CVE-2012-5075 OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888)
  • BZ - 865365 - CVE-2012-5072 OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522)
  • BZ - 865370 - CVE-2012-5081 OpenJDK: JSSE denial of service (JSSE, 7186286)
  • BZ - 865428 - CVE-2012-5086 OpenJDK: XMLDecoder sandbox restriction bypass (Beans, 7195917)
  • BZ - 865511 - CVE-2012-5084 OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194)
  • BZ - 865514 - CVE-2012-5089 OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296)
  • BZ - 865519 - CVE-2012-5071 OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975)
  • BZ - 865531 - CVE-2012-5069 OpenJDK: Executors state handling issues (Concurrency, 7189103)
  • BZ - 865541 - CVE-2012-5085 OpenJDK: disable Gopher support by default (Gopher, 7189567)
  • BZ - 865568 - CVE-2012-5079 OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919)

CVEs

  • CVE-2012-5084
  • CVE-2012-4416
  • CVE-2012-5085
  • CVE-2012-5079
  • CVE-2012-5086
  • CVE-2012-5081
  • CVE-2012-5069
  • CVE-2012-5068
  • CVE-2012-3216
  • CVE-2012-5071
  • CVE-2012-5072
  • CVE-2012-5073
  • CVE-2012-5089
  • CVE-2012-5075
  • CVE-2012-5077

References

  • https://access.redhat.com/security/updates/classification/#critical
  • http://icedtea.classpath.org/hg/release/icedtea6-1.11/file/icedtea6-1.11.5/NEWS
  • http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.src.rpm SHA-256: f785905a3d9142333074f280eedcf51a4fd1d97622b2ba4a08d0011a2afa401f
x86_64
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: e6e79e13e74e9fa0fb20656264a4943fe5b590e9a1e30f688b985be9c8b34e30
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: e6e79e13e74e9fa0fb20656264a4943fe5b590e9a1e30f688b985be9c8b34e30
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: acef011ab841214213395170bf0534281e07bdd05f0fc3bd44621569b1aef7fc
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: acef011ab841214213395170bf0534281e07bdd05f0fc3bd44621569b1aef7fc
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: dfe7609c157346f4edf0384e5509e7593e3640701eb0ea696ce4e76488a6c59f
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: dfe7609c157346f4edf0384e5509e7593e3640701eb0ea696ce4e76488a6c59f
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 56fd0380b5c1085486aa95191fef1292026216944e7e83a6bc8a9785c01fdf16
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 56fd0380b5c1085486aa95191fef1292026216944e7e83a6bc8a9785c01fdf16
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 39b46193e17c44f5e4eeecd7095b18e45f505a09b83941cc4d04ef574517278d
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 39b46193e17c44f5e4eeecd7095b18e45f505a09b83941cc4d04ef574517278d
i386
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: bcd43644a3af691417161813d1654a672a29a0429e4df175b9fd9102d9117944
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: b6da99e08b1e88295deca27dc25ac33651b7ec90a385ad2353fd8467464f347a
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: a9c72ed1d2501591c41469d6b594c0ab3155fb2ee9f6505ee9d2193986cdcdf8
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 132b1f160532cf16cb5b058e26b372359b1a0c8c23ff395bbfd8053c9bf318af
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 221ed19c7038907abfd9c335d2802461ad61e3579aad36a36a302833cfa4b114

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3

SRPM
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.src.rpm SHA-256: f785905a3d9142333074f280eedcf51a4fd1d97622b2ba4a08d0011a2afa401f
x86_64
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: e6e79e13e74e9fa0fb20656264a4943fe5b590e9a1e30f688b985be9c8b34e30
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: acef011ab841214213395170bf0534281e07bdd05f0fc3bd44621569b1aef7fc
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: dfe7609c157346f4edf0384e5509e7593e3640701eb0ea696ce4e76488a6c59f
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 56fd0380b5c1085486aa95191fef1292026216944e7e83a6bc8a9785c01fdf16
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 39b46193e17c44f5e4eeecd7095b18e45f505a09b83941cc4d04ef574517278d
i386
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: bcd43644a3af691417161813d1654a672a29a0429e4df175b9fd9102d9117944
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: b6da99e08b1e88295deca27dc25ac33651b7ec90a385ad2353fd8467464f347a
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: a9c72ed1d2501591c41469d6b594c0ab3155fb2ee9f6505ee9d2193986cdcdf8
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 132b1f160532cf16cb5b058e26b372359b1a0c8c23ff395bbfd8053c9bf318af
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 221ed19c7038907abfd9c335d2802461ad61e3579aad36a36a302833cfa4b114

Red Hat Enterprise Linux Workstation 6

SRPM
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.src.rpm SHA-256: f785905a3d9142333074f280eedcf51a4fd1d97622b2ba4a08d0011a2afa401f
x86_64
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: e6e79e13e74e9fa0fb20656264a4943fe5b590e9a1e30f688b985be9c8b34e30
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: acef011ab841214213395170bf0534281e07bdd05f0fc3bd44621569b1aef7fc
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: dfe7609c157346f4edf0384e5509e7593e3640701eb0ea696ce4e76488a6c59f
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 56fd0380b5c1085486aa95191fef1292026216944e7e83a6bc8a9785c01fdf16
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 39b46193e17c44f5e4eeecd7095b18e45f505a09b83941cc4d04ef574517278d
i386
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: bcd43644a3af691417161813d1654a672a29a0429e4df175b9fd9102d9117944
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: b6da99e08b1e88295deca27dc25ac33651b7ec90a385ad2353fd8467464f347a
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: a9c72ed1d2501591c41469d6b594c0ab3155fb2ee9f6505ee9d2193986cdcdf8
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 132b1f160532cf16cb5b058e26b372359b1a0c8c23ff395bbfd8053c9bf318af
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 221ed19c7038907abfd9c335d2802461ad61e3579aad36a36a302833cfa4b114

Red Hat Enterprise Linux Desktop 6

SRPM
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.src.rpm SHA-256: f785905a3d9142333074f280eedcf51a4fd1d97622b2ba4a08d0011a2afa401f
i386
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: bcd43644a3af691417161813d1654a672a29a0429e4df175b9fd9102d9117944
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: b6da99e08b1e88295deca27dc25ac33651b7ec90a385ad2353fd8467464f347a
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: a9c72ed1d2501591c41469d6b594c0ab3155fb2ee9f6505ee9d2193986cdcdf8
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 132b1f160532cf16cb5b058e26b372359b1a0c8c23ff395bbfd8053c9bf318af
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 221ed19c7038907abfd9c335d2802461ad61e3579aad36a36a302833cfa4b114
x86_64
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: e6e79e13e74e9fa0fb20656264a4943fe5b590e9a1e30f688b985be9c8b34e30
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: acef011ab841214213395170bf0534281e07bdd05f0fc3bd44621569b1aef7fc
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: dfe7609c157346f4edf0384e5509e7593e3640701eb0ea696ce4e76488a6c59f
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 56fd0380b5c1085486aa95191fef1292026216944e7e83a6bc8a9785c01fdf16
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 39b46193e17c44f5e4eeecd7095b18e45f505a09b83941cc4d04ef574517278d

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.src.rpm SHA-256: f785905a3d9142333074f280eedcf51a4fd1d97622b2ba4a08d0011a2afa401f
x86_64
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: e6e79e13e74e9fa0fb20656264a4943fe5b590e9a1e30f688b985be9c8b34e30
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: acef011ab841214213395170bf0534281e07bdd05f0fc3bd44621569b1aef7fc
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: dfe7609c157346f4edf0384e5509e7593e3640701eb0ea696ce4e76488a6c59f
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 56fd0380b5c1085486aa95191fef1292026216944e7e83a6bc8a9785c01fdf16
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 39b46193e17c44f5e4eeecd7095b18e45f505a09b83941cc4d04ef574517278d

Red Hat Enterprise Linux Server from RHUI 6

SRPM
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.src.rpm SHA-256: f785905a3d9142333074f280eedcf51a4fd1d97622b2ba4a08d0011a2afa401f
x86_64
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: e6e79e13e74e9fa0fb20656264a4943fe5b590e9a1e30f688b985be9c8b34e30
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: acef011ab841214213395170bf0534281e07bdd05f0fc3bd44621569b1aef7fc
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: dfe7609c157346f4edf0384e5509e7593e3640701eb0ea696ce4e76488a6c59f
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 56fd0380b5c1085486aa95191fef1292026216944e7e83a6bc8a9785c01fdf16
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 39b46193e17c44f5e4eeecd7095b18e45f505a09b83941cc4d04ef574517278d
i386
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: bcd43644a3af691417161813d1654a672a29a0429e4df175b9fd9102d9117944
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: b6da99e08b1e88295deca27dc25ac33651b7ec90a385ad2353fd8467464f347a
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: a9c72ed1d2501591c41469d6b594c0ab3155fb2ee9f6505ee9d2193986cdcdf8
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 132b1f160532cf16cb5b058e26b372359b1a0c8c23ff395bbfd8053c9bf318af
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 221ed19c7038907abfd9c335d2802461ad61e3579aad36a36a302833cfa4b114

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.src.rpm SHA-256: f785905a3d9142333074f280eedcf51a4fd1d97622b2ba4a08d0011a2afa401f
x86_64
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: e6e79e13e74e9fa0fb20656264a4943fe5b590e9a1e30f688b985be9c8b34e30
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: acef011ab841214213395170bf0534281e07bdd05f0fc3bd44621569b1aef7fc
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: dfe7609c157346f4edf0384e5509e7593e3640701eb0ea696ce4e76488a6c59f
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 56fd0380b5c1085486aa95191fef1292026216944e7e83a6bc8a9785c01fdf16
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 39b46193e17c44f5e4eeecd7095b18e45f505a09b83941cc4d04ef574517278d
i386
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: bcd43644a3af691417161813d1654a672a29a0429e4df175b9fd9102d9117944
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: b6da99e08b1e88295deca27dc25ac33651b7ec90a385ad2353fd8467464f347a
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: a9c72ed1d2501591c41469d6b594c0ab3155fb2ee9f6505ee9d2193986cdcdf8
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 132b1f160532cf16cb5b058e26b372359b1a0c8c23ff395bbfd8053c9bf318af
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 221ed19c7038907abfd9c335d2802461ad61e3579aad36a36a302833cfa4b114

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3

SRPM
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.src.rpm SHA-256: f785905a3d9142333074f280eedcf51a4fd1d97622b2ba4a08d0011a2afa401f
x86_64
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: e6e79e13e74e9fa0fb20656264a4943fe5b590e9a1e30f688b985be9c8b34e30
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: dfe7609c157346f4edf0384e5509e7593e3640701eb0ea696ce4e76488a6c59f
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 56fd0380b5c1085486aa95191fef1292026216944e7e83a6bc8a9785c01fdf16
i386
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: bcd43644a3af691417161813d1654a672a29a0429e4df175b9fd9102d9117944
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: a9c72ed1d2501591c41469d6b594c0ab3155fb2ee9f6505ee9d2193986cdcdf8
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 132b1f160532cf16cb5b058e26b372359b1a0c8c23ff395bbfd8053c9bf318af

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6

SRPM
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.src.rpm SHA-256: f785905a3d9142333074f280eedcf51a4fd1d97622b2ba4a08d0011a2afa401f
x86_64
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: e6e79e13e74e9fa0fb20656264a4943fe5b590e9a1e30f688b985be9c8b34e30
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 0c961fd22d5bb3dfe297f060d47c9f2afd0e5c08d31ea459d9d27e63325ed288
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: acef011ab841214213395170bf0534281e07bdd05f0fc3bd44621569b1aef7fc
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: dfe7609c157346f4edf0384e5509e7593e3640701eb0ea696ce4e76488a6c59f
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 56fd0380b5c1085486aa95191fef1292026216944e7e83a6bc8a9785c01fdf16
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.x86_64.rpm SHA-256: 39b46193e17c44f5e4eeecd7095b18e45f505a09b83941cc4d04ef574517278d
i386
java-1.6.0-openjdk-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: bcd43644a3af691417161813d1654a672a29a0429e4df175b9fd9102d9117944
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-debuginfo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 54a21253216f12c358b048988cc483072fda828ebdc02eb1af1ec2064295d912
java-1.6.0-openjdk-demo-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: b6da99e08b1e88295deca27dc25ac33651b7ec90a385ad2353fd8467464f347a
java-1.6.0-openjdk-devel-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: a9c72ed1d2501591c41469d6b594c0ab3155fb2ee9f6505ee9d2193986cdcdf8
java-1.6.0-openjdk-javadoc-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 132b1f160532cf16cb5b058e26b372359b1a0c8c23ff395bbfd8053c9bf318af
java-1.6.0-openjdk-src-1.6.0.0-1.50.1.11.5.el6_3.i686.rpm SHA-256: 221ed19c7038907abfd9c335d2802461ad61e3579aad36a36a302833cfa4b114

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility