Updated java-1.7.0-openjdk packages that fix one bug are now available for RedHat Enterprise Linux 5.

The java-1.7.0-openjdk packages provide the OpenJDK 7 Java Runtime Environmentand the OpenJDK 7 Java Software Development Kit.This update fixes the following bug:* Prior to this update, an error in the SSL socket code caused the write() andclose() calls to be invoked simultaneously on the same socket, but in twodifferent threads. As a consequence, the socket entered a deadlock. With thisupdate, a measure has been implemented to ensure that calls to close() andread() do not interfere with each other, and the deadlock no longer occurs.(BZ#1101263)Users of java-1.7.0-openjdk are advised to upgrade to these updated packages,which fix this bug. All running instances of OpenJDK Java must be restarted forthe update to take effect.
Before applying this update, make sure all previously released errata relevantto your system have been applied.This update is available via the Red Hat Network. Details on how to use the RedHat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Enterprise Linux (v. 5 server)

SRPMS:
java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el5_10.src.rpm
    MD5: 43fb5bd5d5c2788924a82d9b885ce82dSHA-256: dc36c0e0c02b6e56f95bdd154ca7341a19d16ef02924a6b3d3a5bad3e86c3565
 
IA-32:
java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el5_10.i386.rpm
    MD5: 2f36e499899fa29059f234f9b3d1a3bdSHA-256: 98e8a0372354fe88645433ad30930dc8e027e3d7dd36f0af6e18a9e7ca6a0c21
java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.2.el5_10.i386.rpm
    MD5: 3a60edf9671d298ec3cfbebe1be2ebd8SHA-256: b54f81e87ac108595f33f57ea03dc057fd45645e7fae101ded32b46af0cc3ee3
java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el5_10.i386.rpm
    MD5: 51b147e1e7658b8707c099fa4817f6feSHA-256: c92e8ed5fbb349bbdfa6d45837625e69eed65005d731d40f3662c201fd11fa59
java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el5_10.i386.rpm
    MD5: 80f723dbde8df3349d8c7eee54f4ff10SHA-256: 84c4f15dfea869bca43a7ca2903231e7897475a7d728ccaa38498aa925f86278
java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el5_10.i386.rpm
    MD5: 09610524310f73b29eb4b83d1d02c163SHA-256: be3842a3e96aa8432d27a755b755570e7ed693eb0d5c6edb498b6a25f26ac3c6
java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el5_10.i386.rpm
    MD5: 1b9c007bb8eea192a669fb42bc6c914aSHA-256: 9987597a67e048eecb3812346c47b94d02cc59cb38040dbbde78fe9bcc8ef99c
 
x86_64:
java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el5_10.x86_64.rpm
    MD5: 8440b7830dc79bf77a8ffea4631e2a54SHA-256: 1e8cc978d05371a89b3e7e77226b1d42c34e3d0037c4cc9e6c4accb6d17f9cb8
java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.2.el5_10.x86_64.rpm
    MD5: d280b225243165660d323be00cc37685SHA-256: 230ebfc02332d5316a65c0e49950fe8bfecdcf6735e128ec3bce5bcb21506124
java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el5_10.x86_64.rpm
    MD5: ddab43799c82f2f466f453b04dad82a6SHA-256: 4579657d7b79387fcd02496b3e646221218b8dbb61928dfb4d25fef29ceb0d9a
java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el5_10.x86_64.rpm
    MD5: e9972355568cec62e432a0746868e3d1SHA-256: f036b9346e47b521c9c917057a02dc176d51ecc5fa4c74bd60ccfb109e11e02b
java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el5_10.x86_64.rpm
    MD5: e91cadb9f36ef19ceb62dc6ac73a4103SHA-256: 7aa0d45d5e64a51f5256d2637630d6e2ca7b60d971ae2230e3dfdbb5375e1228
java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el5_10.x86_64.rpm
    MD5: a7f6cdad8593a35dbe4f134e0feabfa3SHA-256: 5e59bb50cf02ae88045a03f47a4ab9cf29f1fd20f723fcca51ad3f3cf77c9446
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el5_10.src.rpm
    MD5: 43fb5bd5d5c2788924a82d9b885ce82dSHA-256: dc36c0e0c02b6e56f95bdd154ca7341a19d16ef02924a6b3d3a5bad3e86c3565
 
IA-32:
java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el5_10.i386.rpm
    MD5: 2f36e499899fa29059f234f9b3d1a3bdSHA-256: 98e8a0372354fe88645433ad30930dc8e027e3d7dd36f0af6e18a9e7ca6a0c21
java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.2.el5_10.i386.rpm
    MD5: 3a60edf9671d298ec3cfbebe1be2ebd8SHA-256: b54f81e87ac108595f33f57ea03dc057fd45645e7fae101ded32b46af0cc3ee3
java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el5_10.i386.rpm
    MD5: 51b147e1e7658b8707c099fa4817f6feSHA-256: c92e8ed5fbb349bbdfa6d45837625e69eed65005d731d40f3662c201fd11fa59
java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el5_10.i386.rpm
    MD5: 80f723dbde8df3349d8c7eee54f4ff10SHA-256: 84c4f15dfea869bca43a7ca2903231e7897475a7d728ccaa38498aa925f86278
java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el5_10.i386.rpm
    MD5: 09610524310f73b29eb4b83d1d02c163SHA-256: be3842a3e96aa8432d27a755b755570e7ed693eb0d5c6edb498b6a25f26ac3c6
java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el5_10.i386.rpm
    MD5: 1b9c007bb8eea192a669fb42bc6c914aSHA-256: 9987597a67e048eecb3812346c47b94d02cc59cb38040dbbde78fe9bcc8ef99c
 
x86_64:
java-1.7.0-openjdk-1.7.0.55-2.4.7.2.el5_10.x86_64.rpm
    MD5: 8440b7830dc79bf77a8ffea4631e2a54SHA-256: 1e8cc978d05371a89b3e7e77226b1d42c34e3d0037c4cc9e6c4accb6d17f9cb8
java-1.7.0-openjdk-debuginfo-1.7.0.55-2.4.7.2.el5_10.x86_64.rpm
    MD5: d280b225243165660d323be00cc37685SHA-256: 230ebfc02332d5316a65c0e49950fe8bfecdcf6735e128ec3bce5bcb21506124
java-1.7.0-openjdk-demo-1.7.0.55-2.4.7.2.el5_10.x86_64.rpm
    MD5: ddab43799c82f2f466f453b04dad82a6SHA-256: 4579657d7b79387fcd02496b3e646221218b8dbb61928dfb4d25fef29ceb0d9a
java-1.7.0-openjdk-devel-1.7.0.55-2.4.7.2.el5_10.x86_64.rpm
    MD5: e9972355568cec62e432a0746868e3d1SHA-256: f036b9346e47b521c9c917057a02dc176d51ecc5fa4c74bd60ccfb109e11e02b
java-1.7.0-openjdk-javadoc-1.7.0.55-2.4.7.2.el5_10.x86_64.rpm
    MD5: e91cadb9f36ef19ceb62dc6ac73a4103SHA-256: 7aa0d45d5e64a51f5256d2637630d6e2ca7b60d971ae2230e3dfdbb5375e1228
java-1.7.0-openjdk-src-1.7.0.55-2.4.7.2.el5_10.x86_64.rpm
    MD5: a7f6cdad8593a35dbe4f134e0feabfa3SHA-256: 5e59bb50cf02ae88045a03f47a4ab9cf29f1fd20f723fcca51ad3f3cf77c9446
 
(The unlinked packages above are only available from the Red Hat Network)
1101263 – Deadlock in SSLSocketImpl between between write and close

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply