Advisory Published

RHSA-2010:0408: Moderate: java-1.4.2-ibm security update

First published: Wed May 12 2010(Updated: )

The IBM 1.4.2 SR13-FP4 Java release includes the IBM Java 2 Runtime<br>Environment and the IBM Java 2 Software Development Kit.<br>This update fixes various vulnerabilities in the IBM Java 2 Runtime<br>Environment and the IBM Java 2 Software Development Kit. These<br>vulnerabilities are summarized on the IBM "Security alerts" page listed in<br>the References section. (CVE-2009-3555, CVE-2009-3867, CVE-2009-3869,<br>CVE-2009-3871, CVE-2009-3874, CVE-2009-3875)<br>For the CVE-2009-3555 issue, this update disables renegotiation in the<br>non-default IBM JSSE2 provider for the Java Secure Socket Extension (JSSE)<br>component. The default JSSE provider is not updated with this fix. Refer to<br>the IBMJSSE2 Provider Reference Guide, linked to in the References, for<br>instructions on how to configure the IBM Java 2 Runtime Environment to use<br>the JSSE2 provider by default.<br>When using the JSSE2 provider, unsafe renegotiation can be re-enabled using<br>the com.ibm.jsse2.renegotiate property. Refer to the following<br>Knowledgebase article for details:<br><a href="http://kbase.redhat.com/faq/docs/DOC-20491" target="_blank">http://kbase.redhat.com/faq/docs/DOC-20491</a> Warning: Do not install these java-1.4.2-ibm packages for SAP alongside the<br>java-1.4.2-ibm packages from the Red Hat Enterprise Linux Extras or<br>Supplementary channels on the Red Hat Network. Doing so could cause your<br>system to fail to update cleanly, among other possible problems.<br>All users of java-1.4.2-ibm for Red Hat Enterprise Linux 4 and 5 for SAP<br>are advised to upgrade to these updated packages, which contain the IBM<br>1.4.2 SR13-FP4 Java release. All running instances of IBM Java must be<br>restarted for this update to take effect.<br>

Affected SoftwareAffected VersionHow to fix
redhat/java<1.4.2-ibm-1.4.2.13.4.sap-1jpp.1.el5
1.4.2-ibm-1.4.2.13.4.sap-1jpp.1.el5
redhat/java<1.4.2-ibm-demo-1.4.2.13.4.sap-1jpp.1.el5
1.4.2-ibm-demo-1.4.2.13.4.sap-1jpp.1.el5
redhat/java<1.4.2-ibm-devel-1.4.2.13.4.sap-1jpp.1.el5
1.4.2-ibm-devel-1.4.2.13.4.sap-1jpp.1.el5
redhat/java<1.4.2-ibm-javacomm-1.4.2.13.4.sap-1jpp.1.el5
1.4.2-ibm-javacomm-1.4.2.13.4.sap-1jpp.1.el5
redhat/java<1.4.2-ibm-src-1.4.2.13.4.sap-1jpp.1.el5
1.4.2-ibm-src-1.4.2.13.4.sap-1jpp.1.el5

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of RHSA-2010:0408?

    RHSA-2010:0408 is rated as critical due to several vulnerabilities in the IBM Java environment.

  • How do I fix RHSA-2010:0408?

    To fix RHSA-2010:0408, you need to update the affected IBM Java packages to the latest version provided by Red Hat.

  • Which packages are affected by RHSA-2010:0408?

    Affected packages for RHSA-2010:0408 include java, java-demo, java-devel, java-javacomm, and java-src versions up to 1.4.2-ibm-1.4.2.13.4.sap-1jpp.1.el5.

  • What vulnerabilities are addressed in RHSA-2010:0408?

    RHSA-2010:0408 addresses multiple vulnerabilities in the IBM Java 2 Runtime Environment and Software Development Kit that could lead to denial of service and arbitrary code execution.

  • Is RHSA-2010:0408 applicable to all systems?

    RHSA-2010:0408 is specific to Red Hat Enterprise Linux environments running the affected versions of IBM Java.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203