Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2012:1386 - Security Advisory
Issued:
2012-10-17
Updated:
2012-11-13

RHSA-2012:1386 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: java-1.7.0-openjdk security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated java-1.7.0-openjdk packages that fix several security issues are
now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.

[Update 13 November 2012]
The file list of this advisory was updated to move java-1.7.0-openjdk-devel
from the optional repositories to the base repositories. Additionally,
java-1.7.0-openjdk for the HPC Node variant was also moved (this package
was already in the base repositories for other product variants). No
changes have been made to the packages themselves.

Description

These packages provide the OpenJDK 7 Java Runtime Environment and the
OpenJDK 7 Software Development Kit.

Multiple improper permission check issues were discovered in the Beans,
Libraries, Swing, and JMX components in OpenJDK. An untrusted Java
application or applet could use these flaws to bypass Java sandbox
restrictions. (CVE-2012-5086, CVE-2012-5087, CVE-2012-5088, CVE-2012-5084,
CVE-2012-5089)

The default Java security properties configuration did not restrict access
to certain com.sun.org.glassfish packages. An untrusted Java application
or applet could use these flaws to bypass Java sandbox restrictions. This
update lists those packages as restricted. (CVE-2012-5076, CVE-2012-5074)

Multiple improper permission check issues were discovered in the Scripting,
JMX, Concurrency, Libraries, and Security components in OpenJDK. An
untrusted Java application or applet could use these flaws to bypass
certain Java sandbox restrictions. (CVE-2012-5068, CVE-2012-5071,
CVE-2012-5069, CVE-2012-5073, CVE-2012-5072)

It was discovered that java.util.ServiceLoader could create an instance of
an incompatible class while performing provider lookup. An untrusted Java
application or applet could use this flaw to bypass certain Java sandbox
restrictions. (CVE-2012-5079)

It was discovered that the Java Secure Socket Extension (JSSE) SSL/TLS
implementation did not properly handle handshake records containing an
overly large data length value. An unauthenticated, remote attacker could
possibly use this flaw to cause an SSL/TLS server to terminate with an
exception. (CVE-2012-5081)

It was discovered that the JMX component in OpenJDK could perform certain
actions in an insecure manner. An untrusted Java application or applet
could possibly use these flaws to disclose sensitive information.
(CVE-2012-5070, CVE-2012-5075)

A bug in the Java HotSpot Virtual Machine optimization code could cause it
to not perform array initialization in certain cases. An untrusted Java
application or applet could use this flaw to disclose portions of the
virtual machine's memory. (CVE-2012-4416)

It was discovered that the SecureRandom class did not properly protect
against the creation of multiple seeders. An untrusted Java application or
applet could possibly use this flaw to disclose sensitive information.
(CVE-2012-5077)

It was discovered that the java.io.FilePermission class exposed the hash
code of the canonicalized path name. An untrusted Java application or
applet could possibly use this flaw to determine certain system paths, such
as the current working directory. (CVE-2012-3216)

This update disables Gopher protocol support in the java.net package by
default. Gopher support can be enabled by setting the newly introduced
property, "jdk.net.registerGopherProtocol", to true. (CVE-2012-5085)

This erratum also upgrades the OpenJDK package to IcedTea7 2.3.3. Refer to
the NEWS file, linked to in the References, for further information.

All users of java-1.7.0-openjdk are advised to upgrade to these updated
packages, which resolve these issues. All running instances of OpenJDK Java
must be restarted for the update to take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3 i386
  • Red Hat Enterprise Linux Workstation 6 x86_64
  • Red Hat Enterprise Linux Workstation 6 i386
  • Red Hat Enterprise Linux Desktop 6 i386
  • Red Hat Enterprise Linux for Scientific Computing 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
  • Red Hat Enterprise Linux Desktop 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386

Fixes

  • BZ - 856124 - CVE-2012-4416 OpenJDK: uninitialized Array JVM memory disclosure (Hotspot, 7198606)
  • BZ - 865346 - CVE-2012-3216 OpenJDK: java.io.FilePermission information leak (Libraries, 6631398)
  • BZ - 865348 - CVE-2012-5068 OpenJDK: RhinoScriptEngine security bypass (Scripting, 7143535)
  • BZ - 865350 - CVE-2012-5070 OpenJDK: EnvHelp information disclosure (JMX, 7158796)
  • BZ - 865352 - CVE-2012-5076 OpenJDK: com.sun.org.glassfish.* not restricted packages (JAX-WS, 7163198)
  • BZ - 865354 - CVE-2012-5077 OpenJDK: SecureRandom mulitple seeders information disclosure (Security, 7167656)
  • BZ - 865357 - CVE-2012-5073 OpenJDK: LogManager security bypass (Libraries, 7169884)
  • BZ - 865359 - CVE-2012-5074 OpenJDK: com.sun.org.glassfish.* not restricted packages (JAX-WS, 7169887)
  • BZ - 865363 - CVE-2012-5075 OpenJDK: RMIConnectionImpl information disclosure (JMX, 7169888)
  • BZ - 865365 - CVE-2012-5072 OpenJDK: AccessController.doPrivilegedWithCombiner() information disclosure (Security, 7172522)
  • BZ - 865370 - CVE-2012-5081 OpenJDK: JSSE denial of service (JSSE, 7186286)
  • BZ - 865428 - CVE-2012-5086 OpenJDK: XMLDecoder sandbox restriction bypass (Beans, 7195917)
  • BZ - 865434 - CVE-2012-5087 OpenJDK: PropertyElementHandler insufficient access checks (Beans, 7195549)
  • BZ - 865471 - CVE-2012-5088 OpenJDK: MethodHandle insufficient access control checks (Libraries, 7196190)
  • BZ - 865511 - CVE-2012-5084 OpenJDK: DefaultFormatter insufficient data validation (Swing, 7195194)
  • BZ - 865514 - CVE-2012-5089 OpenJDK: RMIConnectionImpl insufficient access control checks (JMX, 7198296)
  • BZ - 865519 - CVE-2012-5071 OpenJDK: DescriptorSupport insufficient package access checks (JMX, 7192975)
  • BZ - 865531 - CVE-2012-5069 OpenJDK: Executors state handling issues (Concurrency, 7189103)
  • BZ - 865541 - CVE-2012-5085 OpenJDK: disable Gopher support by default (Gopher, 7189567)
  • BZ - 865568 - CVE-2012-5079 OpenJDK: ServiceLoader reject not subtype classes without instantiating (Libraries, 7195919)

CVEs

  • CVE-2012-5084
  • CVE-2012-4416
  • CVE-2012-5085
  • CVE-2012-5079
  • CVE-2012-5086
  • CVE-2012-5081
  • CVE-2012-5069
  • CVE-2012-5068
  • CVE-2012-3216
  • CVE-2012-5071
  • CVE-2012-5072
  • CVE-2012-5073
  • CVE-2012-5089
  • CVE-2012-5075
  • CVE-2012-5077
  • CVE-2012-5088
  • CVE-2012-5070
  • CVE-2012-5087
  • CVE-2012-5074
  • CVE-2012-5076

References

  • https://access.redhat.com/security/updates/classification/#important
  • http://icedtea.classpath.org/hg/release/icedtea7-2.3/file/icedtea-2.3.3/NEWS
  • http://www.oracle.com/technetwork/topics/security/javacpuoct2012-1515924.html
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.src.rpm SHA-256: c4fcabd79bb05ff78a7a6f8a0ec2949a41f64bee8ea699c8967087515b88d1d0
x86_64
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 6587afab8db7a5ed22443e209b44243f7e456a277474d90ead742c6f32d4f300
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 6587afab8db7a5ed22443e209b44243f7e456a277474d90ead742c6f32d4f300
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 3e526a16a06f6bee6f985f9dc3af284399296c5ea0eb80ec985118f19da2b6ab
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 3e526a16a06f6bee6f985f9dc3af284399296c5ea0eb80ec985118f19da2b6ab
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 3e526a16a06f6bee6f985f9dc3af284399296c5ea0eb80ec985118f19da2b6ab
java-1.7.0-openjdk-demo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: ecaec5cc8309af8cbacbff6462affeb93bf8fa5cd46d5e3723c0fb98087553df
java-1.7.0-openjdk-demo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: ecaec5cc8309af8cbacbff6462affeb93bf8fa5cd46d5e3723c0fb98087553df
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 0a0f801c480be2692e1970def8c9f517c453dd698a96b1410ff7a3981fb68ab1
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 0a0f801c480be2692e1970def8c9f517c453dd698a96b1410ff7a3981fb68ab1
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 0a0f801c480be2692e1970def8c9f517c453dd698a96b1410ff7a3981fb68ab1
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 0a0f801c480be2692e1970def8c9f517c453dd698a96b1410ff7a3981fb68ab1
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.3.el6_3.1.noarch.rpm SHA-256: e5cbf0b18f4a284e7816c0a9d13e98be6a4b720098a5bc37e1c7be6897a64e62
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.3.el6_3.1.noarch.rpm SHA-256: e5cbf0b18f4a284e7816c0a9d13e98be6a4b720098a5bc37e1c7be6897a64e62
java-1.7.0-openjdk-src-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 635458c4b27d7f32f737c0453d7bc5e0a3ddf56c72727a1b4bf1192fbdf0f1fd
java-1.7.0-openjdk-src-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 635458c4b27d7f32f737c0453d7bc5e0a3ddf56c72727a1b4bf1192fbdf0f1fd
i386
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 55e6be59f06bcf5dc1a2f3fdfab183fd6cf947c23ca411484030aa92a091af46
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: e1dd3a52a20ea757b4e43a0a9577f79c3bad39b1a29955b076fd4f8b6b3bc257
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: e1dd3a52a20ea757b4e43a0a9577f79c3bad39b1a29955b076fd4f8b6b3bc257
java-1.7.0-openjdk-demo-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 2936eba685d706a2bbf837100b4e9bc1e127665e50b05c6f7289ef726deeeff6
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 1544e0cd31cc609ad2431dd893b2340741b1406d6d012663765bd71ba7f79b9e
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 1544e0cd31cc609ad2431dd893b2340741b1406d6d012663765bd71ba7f79b9e
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.3.el6_3.1.noarch.rpm SHA-256: e5cbf0b18f4a284e7816c0a9d13e98be6a4b720098a5bc37e1c7be6897a64e62
java-1.7.0-openjdk-src-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 1a2bb1a26ae5a8425e7777b6fc3a98b467055579ef6d3f06e05069fc62bd8576

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3

SRPM
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.src.rpm SHA-256: c4fcabd79bb05ff78a7a6f8a0ec2949a41f64bee8ea699c8967087515b88d1d0
x86_64
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 6587afab8db7a5ed22443e209b44243f7e456a277474d90ead742c6f32d4f300
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 3e526a16a06f6bee6f985f9dc3af284399296c5ea0eb80ec985118f19da2b6ab
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 3e526a16a06f6bee6f985f9dc3af284399296c5ea0eb80ec985118f19da2b6ab
java-1.7.0-openjdk-demo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: ecaec5cc8309af8cbacbff6462affeb93bf8fa5cd46d5e3723c0fb98087553df
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 0a0f801c480be2692e1970def8c9f517c453dd698a96b1410ff7a3981fb68ab1
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 0a0f801c480be2692e1970def8c9f517c453dd698a96b1410ff7a3981fb68ab1
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.3.el6_3.1.noarch.rpm SHA-256: e5cbf0b18f4a284e7816c0a9d13e98be6a4b720098a5bc37e1c7be6897a64e62
java-1.7.0-openjdk-src-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 635458c4b27d7f32f737c0453d7bc5e0a3ddf56c72727a1b4bf1192fbdf0f1fd
i386
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 55e6be59f06bcf5dc1a2f3fdfab183fd6cf947c23ca411484030aa92a091af46
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: e1dd3a52a20ea757b4e43a0a9577f79c3bad39b1a29955b076fd4f8b6b3bc257
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: e1dd3a52a20ea757b4e43a0a9577f79c3bad39b1a29955b076fd4f8b6b3bc257
java-1.7.0-openjdk-demo-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 2936eba685d706a2bbf837100b4e9bc1e127665e50b05c6f7289ef726deeeff6
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 1544e0cd31cc609ad2431dd893b2340741b1406d6d012663765bd71ba7f79b9e
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 1544e0cd31cc609ad2431dd893b2340741b1406d6d012663765bd71ba7f79b9e
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.3.el6_3.1.noarch.rpm SHA-256: e5cbf0b18f4a284e7816c0a9d13e98be6a4b720098a5bc37e1c7be6897a64e62
java-1.7.0-openjdk-src-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 1a2bb1a26ae5a8425e7777b6fc3a98b467055579ef6d3f06e05069fc62bd8576

Red Hat Enterprise Linux Workstation 6

SRPM
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.src.rpm SHA-256: c4fcabd79bb05ff78a7a6f8a0ec2949a41f64bee8ea699c8967087515b88d1d0
x86_64
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 6587afab8db7a5ed22443e209b44243f7e456a277474d90ead742c6f32d4f300
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 3e526a16a06f6bee6f985f9dc3af284399296c5ea0eb80ec985118f19da2b6ab
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 3e526a16a06f6bee6f985f9dc3af284399296c5ea0eb80ec985118f19da2b6ab
java-1.7.0-openjdk-demo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: ecaec5cc8309af8cbacbff6462affeb93bf8fa5cd46d5e3723c0fb98087553df
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 0a0f801c480be2692e1970def8c9f517c453dd698a96b1410ff7a3981fb68ab1
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 0a0f801c480be2692e1970def8c9f517c453dd698a96b1410ff7a3981fb68ab1
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.3.el6_3.1.noarch.rpm SHA-256: e5cbf0b18f4a284e7816c0a9d13e98be6a4b720098a5bc37e1c7be6897a64e62
java-1.7.0-openjdk-src-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 635458c4b27d7f32f737c0453d7bc5e0a3ddf56c72727a1b4bf1192fbdf0f1fd
i386
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 55e6be59f06bcf5dc1a2f3fdfab183fd6cf947c23ca411484030aa92a091af46
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: e1dd3a52a20ea757b4e43a0a9577f79c3bad39b1a29955b076fd4f8b6b3bc257
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: e1dd3a52a20ea757b4e43a0a9577f79c3bad39b1a29955b076fd4f8b6b3bc257
java-1.7.0-openjdk-demo-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 2936eba685d706a2bbf837100b4e9bc1e127665e50b05c6f7289ef726deeeff6
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 1544e0cd31cc609ad2431dd893b2340741b1406d6d012663765bd71ba7f79b9e
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 1544e0cd31cc609ad2431dd893b2340741b1406d6d012663765bd71ba7f79b9e
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.3.el6_3.1.noarch.rpm SHA-256: e5cbf0b18f4a284e7816c0a9d13e98be6a4b720098a5bc37e1c7be6897a64e62
java-1.7.0-openjdk-src-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 1a2bb1a26ae5a8425e7777b6fc3a98b467055579ef6d3f06e05069fc62bd8576

Red Hat Enterprise Linux Desktop 6

SRPM
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.src.rpm SHA-256: c4fcabd79bb05ff78a7a6f8a0ec2949a41f64bee8ea699c8967087515b88d1d0
i386
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 55e6be59f06bcf5dc1a2f3fdfab183fd6cf947c23ca411484030aa92a091af46
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: e1dd3a52a20ea757b4e43a0a9577f79c3bad39b1a29955b076fd4f8b6b3bc257
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: e1dd3a52a20ea757b4e43a0a9577f79c3bad39b1a29955b076fd4f8b6b3bc257
java-1.7.0-openjdk-demo-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 2936eba685d706a2bbf837100b4e9bc1e127665e50b05c6f7289ef726deeeff6
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 1544e0cd31cc609ad2431dd893b2340741b1406d6d012663765bd71ba7f79b9e
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.3.el6_3.1.noarch.rpm SHA-256: e5cbf0b18f4a284e7816c0a9d13e98be6a4b720098a5bc37e1c7be6897a64e62
java-1.7.0-openjdk-src-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 1a2bb1a26ae5a8425e7777b6fc3a98b467055579ef6d3f06e05069fc62bd8576
x86_64
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 6587afab8db7a5ed22443e209b44243f7e456a277474d90ead742c6f32d4f300
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 3e526a16a06f6bee6f985f9dc3af284399296c5ea0eb80ec985118f19da2b6ab
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 3e526a16a06f6bee6f985f9dc3af284399296c5ea0eb80ec985118f19da2b6ab
java-1.7.0-openjdk-demo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: ecaec5cc8309af8cbacbff6462affeb93bf8fa5cd46d5e3723c0fb98087553df
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 0a0f801c480be2692e1970def8c9f517c453dd698a96b1410ff7a3981fb68ab1
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.3.el6_3.1.noarch.rpm SHA-256: e5cbf0b18f4a284e7816c0a9d13e98be6a4b720098a5bc37e1c7be6897a64e62
java-1.7.0-openjdk-src-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 635458c4b27d7f32f737c0453d7bc5e0a3ddf56c72727a1b4bf1192fbdf0f1fd

Red Hat Enterprise Linux for Scientific Computing 6

SRPM
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.src.rpm SHA-256: c4fcabd79bb05ff78a7a6f8a0ec2949a41f64bee8ea699c8967087515b88d1d0
x86_64
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 6587afab8db7a5ed22443e209b44243f7e456a277474d90ead742c6f32d4f300
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 6587afab8db7a5ed22443e209b44243f7e456a277474d90ead742c6f32d4f300
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 3e526a16a06f6bee6f985f9dc3af284399296c5ea0eb80ec985118f19da2b6ab
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 3e526a16a06f6bee6f985f9dc3af284399296c5ea0eb80ec985118f19da2b6ab
java-1.7.0-openjdk-demo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: ecaec5cc8309af8cbacbff6462affeb93bf8fa5cd46d5e3723c0fb98087553df
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 0a0f801c480be2692e1970def8c9f517c453dd698a96b1410ff7a3981fb68ab1
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.3.el6_3.1.noarch.rpm SHA-256: e5cbf0b18f4a284e7816c0a9d13e98be6a4b720098a5bc37e1c7be6897a64e62
java-1.7.0-openjdk-src-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 635458c4b27d7f32f737c0453d7bc5e0a3ddf56c72727a1b4bf1192fbdf0f1fd

Red Hat Enterprise Linux Server from RHUI 6

SRPM
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.src.rpm SHA-256: c4fcabd79bb05ff78a7a6f8a0ec2949a41f64bee8ea699c8967087515b88d1d0
x86_64
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 6587afab8db7a5ed22443e209b44243f7e456a277474d90ead742c6f32d4f300
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 3e526a16a06f6bee6f985f9dc3af284399296c5ea0eb80ec985118f19da2b6ab
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 3e526a16a06f6bee6f985f9dc3af284399296c5ea0eb80ec985118f19da2b6ab
java-1.7.0-openjdk-demo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: ecaec5cc8309af8cbacbff6462affeb93bf8fa5cd46d5e3723c0fb98087553df
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 0a0f801c480be2692e1970def8c9f517c453dd698a96b1410ff7a3981fb68ab1
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 0a0f801c480be2692e1970def8c9f517c453dd698a96b1410ff7a3981fb68ab1
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.3.el6_3.1.noarch.rpm SHA-256: e5cbf0b18f4a284e7816c0a9d13e98be6a4b720098a5bc37e1c7be6897a64e62
java-1.7.0-openjdk-src-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 635458c4b27d7f32f737c0453d7bc5e0a3ddf56c72727a1b4bf1192fbdf0f1fd
i386
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 55e6be59f06bcf5dc1a2f3fdfab183fd6cf947c23ca411484030aa92a091af46
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: e1dd3a52a20ea757b4e43a0a9577f79c3bad39b1a29955b076fd4f8b6b3bc257
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: e1dd3a52a20ea757b4e43a0a9577f79c3bad39b1a29955b076fd4f8b6b3bc257
java-1.7.0-openjdk-demo-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 2936eba685d706a2bbf837100b4e9bc1e127665e50b05c6f7289ef726deeeff6
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 1544e0cd31cc609ad2431dd893b2340741b1406d6d012663765bd71ba7f79b9e
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 1544e0cd31cc609ad2431dd893b2340741b1406d6d012663765bd71ba7f79b9e
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.3.el6_3.1.noarch.rpm SHA-256: e5cbf0b18f4a284e7816c0a9d13e98be6a4b720098a5bc37e1c7be6897a64e62
java-1.7.0-openjdk-src-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 1a2bb1a26ae5a8425e7777b6fc3a98b467055579ef6d3f06e05069fc62bd8576

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.src.rpm SHA-256: c4fcabd79bb05ff78a7a6f8a0ec2949a41f64bee8ea699c8967087515b88d1d0
x86_64
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 6587afab8db7a5ed22443e209b44243f7e456a277474d90ead742c6f32d4f300
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 3e526a16a06f6bee6f985f9dc3af284399296c5ea0eb80ec985118f19da2b6ab
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 3e526a16a06f6bee6f985f9dc3af284399296c5ea0eb80ec985118f19da2b6ab
java-1.7.0-openjdk-demo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: ecaec5cc8309af8cbacbff6462affeb93bf8fa5cd46d5e3723c0fb98087553df
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 0a0f801c480be2692e1970def8c9f517c453dd698a96b1410ff7a3981fb68ab1
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 0a0f801c480be2692e1970def8c9f517c453dd698a96b1410ff7a3981fb68ab1
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.3.el6_3.1.noarch.rpm SHA-256: e5cbf0b18f4a284e7816c0a9d13e98be6a4b720098a5bc37e1c7be6897a64e62
java-1.7.0-openjdk-src-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 635458c4b27d7f32f737c0453d7bc5e0a3ddf56c72727a1b4bf1192fbdf0f1fd
i386
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 55e6be59f06bcf5dc1a2f3fdfab183fd6cf947c23ca411484030aa92a091af46
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: e1dd3a52a20ea757b4e43a0a9577f79c3bad39b1a29955b076fd4f8b6b3bc257
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: e1dd3a52a20ea757b4e43a0a9577f79c3bad39b1a29955b076fd4f8b6b3bc257
java-1.7.0-openjdk-demo-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 2936eba685d706a2bbf837100b4e9bc1e127665e50b05c6f7289ef726deeeff6
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 1544e0cd31cc609ad2431dd893b2340741b1406d6d012663765bd71ba7f79b9e
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 1544e0cd31cc609ad2431dd893b2340741b1406d6d012663765bd71ba7f79b9e
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.3.el6_3.1.noarch.rpm SHA-256: e5cbf0b18f4a284e7816c0a9d13e98be6a4b720098a5bc37e1c7be6897a64e62
java-1.7.0-openjdk-src-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 1a2bb1a26ae5a8425e7777b6fc3a98b467055579ef6d3f06e05069fc62bd8576

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3

SRPM
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.src.rpm SHA-256: c4fcabd79bb05ff78a7a6f8a0ec2949a41f64bee8ea699c8967087515b88d1d0
x86_64
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 6587afab8db7a5ed22443e209b44243f7e456a277474d90ead742c6f32d4f300
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 3e526a16a06f6bee6f985f9dc3af284399296c5ea0eb80ec985118f19da2b6ab
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 0a0f801c480be2692e1970def8c9f517c453dd698a96b1410ff7a3981fb68ab1
i386
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 55e6be59f06bcf5dc1a2f3fdfab183fd6cf947c23ca411484030aa92a091af46
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: e1dd3a52a20ea757b4e43a0a9577f79c3bad39b1a29955b076fd4f8b6b3bc257
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 1544e0cd31cc609ad2431dd893b2340741b1406d6d012663765bd71ba7f79b9e

Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6

SRPM
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.src.rpm SHA-256: c4fcabd79bb05ff78a7a6f8a0ec2949a41f64bee8ea699c8967087515b88d1d0
x86_64
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 6587afab8db7a5ed22443e209b44243f7e456a277474d90ead742c6f32d4f300
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 3e526a16a06f6bee6f985f9dc3af284399296c5ea0eb80ec985118f19da2b6ab
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 3e526a16a06f6bee6f985f9dc3af284399296c5ea0eb80ec985118f19da2b6ab
java-1.7.0-openjdk-demo-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: ecaec5cc8309af8cbacbff6462affeb93bf8fa5cd46d5e3723c0fb98087553df
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 0a0f801c480be2692e1970def8c9f517c453dd698a96b1410ff7a3981fb68ab1
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 0a0f801c480be2692e1970def8c9f517c453dd698a96b1410ff7a3981fb68ab1
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.3.el6_3.1.noarch.rpm SHA-256: e5cbf0b18f4a284e7816c0a9d13e98be6a4b720098a5bc37e1c7be6897a64e62
java-1.7.0-openjdk-src-1.7.0.9-2.3.3.el6_3.1.x86_64.rpm SHA-256: 635458c4b27d7f32f737c0453d7bc5e0a3ddf56c72727a1b4bf1192fbdf0f1fd
i386
java-1.7.0-openjdk-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 55e6be59f06bcf5dc1a2f3fdfab183fd6cf947c23ca411484030aa92a091af46
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: e1dd3a52a20ea757b4e43a0a9577f79c3bad39b1a29955b076fd4f8b6b3bc257
java-1.7.0-openjdk-debuginfo-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: e1dd3a52a20ea757b4e43a0a9577f79c3bad39b1a29955b076fd4f8b6b3bc257
java-1.7.0-openjdk-demo-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 2936eba685d706a2bbf837100b4e9bc1e127665e50b05c6f7289ef726deeeff6
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 1544e0cd31cc609ad2431dd893b2340741b1406d6d012663765bd71ba7f79b9e
java-1.7.0-openjdk-devel-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 1544e0cd31cc609ad2431dd893b2340741b1406d6d012663765bd71ba7f79b9e
java-1.7.0-openjdk-javadoc-1.7.0.9-2.3.3.el6_3.1.noarch.rpm SHA-256: e5cbf0b18f4a284e7816c0a9d13e98be6a4b720098a5bc37e1c7be6897a64e62
java-1.7.0-openjdk-src-1.7.0.9-2.3.3.el6_3.1.i686.rpm SHA-256: 1a2bb1a26ae5a8425e7777b6fc3a98b467055579ef6d3f06e05069fc62bd8576

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility