Home > Java Runtime > Java Runtime 1.4.2.06

Java Runtime 1.4.2.06

HP-UX Java version end-of-support dates: Java 5 EOS: March 18, 2014 Java 6 EOS: September, 2016 Prior releases: Java 1.4.2: Reached EOS on May 1, 2012. A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. Customers are encouraged to migrate today. » Read More Release 1.4 of the Java 2 Platform, Standard Edition (J2SE) represents an advance from J2SE 1.3. For an MPAS process, each call to mmap is independent of other mappings made by the same process. http://evollux.net/java-runtime/a-java-runtime-environment-or-java-development-kit-must-be-available-in-order-to-run-notes2.html

Customers are advised to peruse the referenced advisory for further information regarding obtaining and applying appropriate updates. Oracle Country Country Communities I am a... FreeBSD releases ports collection updates at the following link: Ports Collection Index Gentoo hasprovided the following update for dev-java/sun-jdk: emerge --sync emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.4.2.06" Gentoo hasprovided the following update The issue has been addressed by RPM patch 118752-02, which may be applied by running the following command sequence from the "launch" menu: Launch >> Applications >> System Tools >> Online

Software Depot Provide site feedback Sign up to get product updates, drivers and support alerts --> Oracle is scheduled to release Java 8 in March 2014 and Java 9 during the Action Links for This Alert Snort Rule 17586 Snort Rule 21462 Sun JRE Java Plug-in JavaScript Access Controls Bypass Vulnerability Information For Small Business Midsize Business Service Provider Executives Industries Automotive An active web site is exploiting this vulnerability. An attacker would need to convince a user into visiting the site. Once the Java Applet bypasses the Java security settings, the attacker

FreeBSD has released a VuXML document at the following link: jdk/jre -- Security Vulnerability With Java Plugin Gentoo has released a security advisory at the following link: GLSA 200411-38 IBM has Please see the referenced advisory for further information. HP has released an advisory HPSBUX01100 to address this issue in HP-UX. The JDK includes the HP-UX 11i Java Runtime Environment (JRE).

Please see the referenced advisory for more information. First, we recommend that you have the latest HP-UX Quality Pack installed. java -d32 -Xmpas:on java -d64 -Xmpas:on This causes the mpas-enabled Java executable java_q4p to be run, which exists for both 32 and 64 bit. The affected products do not directly utilize the vulnerable application, but they contain a vulnerable version.

Note: HPE recommends using the latest version to ensure highest reliability, including all available security fixes. » Version 8.0.08 – December 2016 (includes Oracle update 8u112) » Version 8.0.07 – September Important Notice! Known Issues: fileChannel.map is implemented using mmap on the underlying operating system. Making the default Java driver mpas might have a slight negative performance impact. -Xmpas is available on Java 1.4.2.06 and later.

Information regarding obtaining and applying an appropriate patch can be found in the Oracle Critical Patch Update in references. Please see the referenced advisory for further information. Sun Microsystems has released Sun Alert ID: 57741 dealing with this issue in their Java Desktop System (JDS) packages for Linux. Software Depot Provide site feedback Sign up to get product updates, drivers and support alerts  » HP-UX 11i Java Home Key features of JDK/JRE 8.0.x are: 32-bit and 64-bit Hotspot

As newer versions of Java are released, older versions of Java will reach EOS. have a peek at these guys JDK/JRE 8.0.x Downloads For help installing your JDK/JRE 8.0.x product, see the installation instructions in the product's release notes listed on the Hewlett Packard Enterprise Support Center at: http://www.hpe.com/info/hpux-java-docs (under "Getting Link to a demonstration of Sun's Open Language Tools Link to the Open Language Tools page Copyright © 2010-2011 Marc Prior Below are the current known end-of-support dates for Java.

The affected JRE has beenincorporated into certain vendors' stand-alone products. Products that distribute a dedicated JRE in this manner may also be affectedby an included affected version. On HP Integrity Itanium® servers running HP-UX 11i, multiple mmap calls of overlapping regions of a single file with the MAP_SHARED flag specified in the mmap call, would result in an To obtain it, go to the Hewlett Packard Support Center site at http://www.hpe.com/support/hpesc (you need an HP-UX support contract to obtain quality packs and patches). http://evollux.net/java-runtime/java-runtime-environment-1-5-0-download-java-com.html See the Java 8.0.x Release Notes for any additional known issues.

Conectiva products are supported by Mandriva. HP and Sun have confirmed this vulnerability and released updated software. To obtain it, go to the Hewlett Packard Enterprise Support Center site at http://www.hpe.com/support/hpesc (you need an HP-UX support contract to obtain quality packs and patches).

Apple users are advised to see the referenced advisory for further information in regards to obtaining and applying an appropriate fix.

Vendor Announcements Hewlett-Packard has released security bulletins at the following links: HPSBUX01100and HPSBUX01214 Sun has released alert notifications at the following links: 201660and 200918 Apple has released a security update at First, we recommend that you have the latest HP-UX Quality Pack installed. The JDK includes the HP-UX 11i Java Runtime Environment (JRE). HP has released advisory HPSBUX01214 (SSRT051003 rev.0 - HP-UX Java Web Start remote unauthorized privileged access) to address this issue in HP-UX B.11.11 and HP-UX B.11.23.

Symantec has released advisory SYM05-001 to address this issue in various Symantec products. Currently, it is unknown which exact Oracle products include vulnerable packages. Apple has released an advisory (APPLE-SA-2005-02-22) and an update to address this vulnerability. http://evollux.net/java-runtime/java-runtime-environment-jre-or-java-development-kit.html Support Life Policy For the latest information on the HP-UX Java 1.4.2 Support Life Policy, see Java Support Life.

Analysis The remote attacker would need to use social engineering tactics in order to exploit this vulnerability. The vulnerability only affects the Sun Java Runtime Environment, Software Development Kit and Java Users of affected packages are urged to execute the following commands with superuser privileges: Sun JDK users: emerge --sync emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.4.2.06" Sun JRE users: emerge --sync emerge --ask For other distributions click java-1.4.2-sun. Sun provides some older product and technology releases as a courtesy to developers for problem resolution.

The application was finally released in 2005. To download and install the updated RPMs from the update servers, select the following sequence from the "launch" menu: Launch >> Applications >> System Tools >> Online Update Sun Microsystems has Then to see what patches are required for your Java version and HP-UX version/Quality Pack, go to the HP-UX Java Patch Information page, and follow the recommendations for your Java version. Required Patches Some HP-UX patches may be required for your Java version.

YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Customers are advised to peruse the referenced advisory for further information regarding obtaining and applying appropriate updates. SuSE Linux has released a security summary report (SUSE-SR:2005:002) that contains fixes to address this and other vulnerabilities. Important: On HP Itanium servers, if the Aries option is set to -pa_os_cpu globally, HP-UX Java incorrectly runs PA binaries instead of IA binaries.

JDK/JRE 8.0.x patch requirements are the same as for 6.0, plus any additional ones listed in the Java 8.0.x Release Notes. SuSE Linux has released a security summary report (SUSE-SR:2005:003) that contains fixes to address this and other vulnerabilities. J2SE 1.4 adds new features and functionality, enhanced performance and scalability, and improved reliability and serviceability. » Download J2SE 1.4.2.