Skip to navigation

Bug Fix Advisory jpackage-utils bug fix update

Advisory: RHBA-2013:0115-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated jpackage-utils packages that fix one bug are now available for Red Hat
Enterprise Linux 5.

The jpackage-utils package installs directory structures, RPM macros,
configuration files, and scripts that provide support for jpackage.org Java
packaging. It is required by all packages that follow the JPackage conventions.

* Previously, jpackage-utils did not install java-1.7.0 directories in the
/usr/share/ and /usr/lib/ directories. This caused failures when running the
build-classpath script with Java 7 set as the javac alternative. These
directories are now created and the build-classpath script works as expected
with Java 7. (BZ#865102)

All users of jpackage-utils should upgrade to these updated packages that fix
this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
jpackage-utils-1.7.3-1jpp.3.el5.src.rpm     MD5: e8d94a6a85ef1468e9f02652e616e10d
SHA-256: 94770a3aaf936d8216253fe85a0ea542f4c38bb2118708298f7d830bb722b752
 
IA-32:
jpackage-utils-1.7.3-1jpp.3.el5.noarch.rpm     MD5: bea64b30ea551de85a22862bf97226bb
SHA-256: ad63e753d318a180d98340a66b6d5ba78a4081cc9c5d3ecab8c05070788819bc
 
IA-64:
jpackage-utils-1.7.3-1jpp.3.el5.noarch.rpm     MD5: bea64b30ea551de85a22862bf97226bb
SHA-256: ad63e753d318a180d98340a66b6d5ba78a4081cc9c5d3ecab8c05070788819bc
 
PPC:
jpackage-utils-1.7.3-1jpp.3.el5.noarch.rpm     MD5: bea64b30ea551de85a22862bf97226bb
SHA-256: ad63e753d318a180d98340a66b6d5ba78a4081cc9c5d3ecab8c05070788819bc
 
s390x:
jpackage-utils-1.7.3-1jpp.3.el5.noarch.rpm     MD5: bea64b30ea551de85a22862bf97226bb
SHA-256: ad63e753d318a180d98340a66b6d5ba78a4081cc9c5d3ecab8c05070788819bc
 
x86_64:
jpackage-utils-1.7.3-1jpp.3.el5.noarch.rpm     MD5: bea64b30ea551de85a22862bf97226bb
SHA-256: ad63e753d318a180d98340a66b6d5ba78a4081cc9c5d3ecab8c05070788819bc
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
jpackage-utils-1.7.3-1jpp.3.el5.src.rpm     MD5: e8d94a6a85ef1468e9f02652e616e10d
SHA-256: 94770a3aaf936d8216253fe85a0ea542f4c38bb2118708298f7d830bb722b752
 
IA-32:
jpackage-utils-1.7.3-1jpp.3.el5.noarch.rpm     MD5: bea64b30ea551de85a22862bf97226bb
SHA-256: ad63e753d318a180d98340a66b6d5ba78a4081cc9c5d3ecab8c05070788819bc
 
x86_64:
jpackage-utils-1.7.3-1jpp.3.el5.noarch.rpm     MD5: bea64b30ea551de85a22862bf97226bb
SHA-256: ad63e753d318a180d98340a66b6d5ba78a4081cc9c5d3ecab8c05070788819bc
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/