Headline
RHSA-2022:2137: Red Hat Security Advisory: java-1.8.0-openjdk security update
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504)
- CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672)
- CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151)
- CVE-2022-21476: OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008)
- CVE-2022-21496: OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
概要
Important: java-1.8.0-openjdk security update
タイプ/重大度
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
トピック
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
説明
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
- OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) (CVE-2022-21476)
- OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) (CVE-2022-21426)
- OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) (CVE-2022-21434)
- OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) (CVE-2022-21443)
- OpenJDK: URI parsing inconsistencies (JNDI, 8278972) (CVE-2022-21496)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
解決法
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
All running instances of OpenJDK Java must be restarted for this update to take effect.
影響を受ける製品
- Red Hat Enterprise Linux for x86_64 9 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0 x86_64
- Red Hat Enterprise Linux for IBM z Systems 9 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0 s390x
- Red Hat Enterprise Linux for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0 ppc64le
- Red Hat Enterprise Linux for ARM 64 9 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
- Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 9.0 x86_64
- Red Hat CodeReady Linux Builder for x86_64 9 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian 9 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 9 aarch64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0 aarch64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.0 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.0 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.0 aarch64
- Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64
- Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0 s390x
修正
- BZ - 2075788 - CVE-2022-21426 OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504)
- BZ - 2075793 - CVE-2022-21443 OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151)
- BZ - 2075836 - CVE-2022-21434 OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672)
- BZ - 2075842 - CVE-2022-21476 OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008)
- BZ - 2075849 - CVE-2022-21496 OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
CVE
- CVE-2022-21426
- CVE-2022-21434
- CVE-2022-21443
- CVE-2022-21476
- CVE-2022-21496
参考資料
- https://access.redhat.com/security/updates/classification/#important
Red Hat Enterprise Linux for x86_64 9
SRPM
java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.src.rpm
SHA-256: ea7d32745e443ff392f974d800ba34da025546a3f44f5e8f456870c99bb197b7
x86_64
java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: bb8ed5dfb786b1757246dfa3ce795aa9ea72a0c31fa282a323ee8fa5d4c0419a
java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 89c07b6deee1723716d1032bc2e5b23d5cebf06d6f0d0dd4dcc9882a4ebf56ec
java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 02a93d22de8b24d10e28a310bfb14df5a8c99f15bf80877eac4b98b0e431896d
java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 91326283c6f56416e09c3504229df18264217ca719eeab9547b94f6f1ff00c2a
java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 351858293760ef252c8d18c8e6dae09903b2254a0cc63e5ce93d17dd4df7d22f
java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 8a2031e11e58c0518768d8b3e5b3f29d00a1faf78f6ac70f55389e383b4ffb92
java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: d069196e88ae50deca2a411a276729f400bc1c857446f4c4fb25aa4ee423f099
java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 15bd6ff347cf5a480d0b3c70bfcfd6f8d8b3f2b89cfb0db83c8b6dbbc6b81317
java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: b6bd18fe32acec3dedb2263dfc1879b48266bbef163c366d9c473ccd633f2f7f
java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el9_0.noarch.rpm
SHA-256: 150700c210a6c1380cabc78224a895b1f92ec0903a750c5092dc96557042f4da
java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el9_0.noarch.rpm
SHA-256: 969e5cfd63770bb18e5af3da4e074807ed8b30052a324df84b86fc50c2b7e2b2
java-1.8.0-openjdk-src-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 525434e48b7dd24dd82c50156aa7ba24dd311c1c4e66a3e571635ef628d2e90d
Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0
SRPM
java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.src.rpm
SHA-256: ea7d32745e443ff392f974d800ba34da025546a3f44f5e8f456870c99bb197b7
x86_64
java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: bb8ed5dfb786b1757246dfa3ce795aa9ea72a0c31fa282a323ee8fa5d4c0419a
java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 89c07b6deee1723716d1032bc2e5b23d5cebf06d6f0d0dd4dcc9882a4ebf56ec
java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 02a93d22de8b24d10e28a310bfb14df5a8c99f15bf80877eac4b98b0e431896d
java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 91326283c6f56416e09c3504229df18264217ca719eeab9547b94f6f1ff00c2a
java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 351858293760ef252c8d18c8e6dae09903b2254a0cc63e5ce93d17dd4df7d22f
java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 8a2031e11e58c0518768d8b3e5b3f29d00a1faf78f6ac70f55389e383b4ffb92
java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: d069196e88ae50deca2a411a276729f400bc1c857446f4c4fb25aa4ee423f099
java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 15bd6ff347cf5a480d0b3c70bfcfd6f8d8b3f2b89cfb0db83c8b6dbbc6b81317
java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: b6bd18fe32acec3dedb2263dfc1879b48266bbef163c366d9c473ccd633f2f7f
java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el9_0.noarch.rpm
SHA-256: 150700c210a6c1380cabc78224a895b1f92ec0903a750c5092dc96557042f4da
java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el9_0.noarch.rpm
SHA-256: 969e5cfd63770bb18e5af3da4e074807ed8b30052a324df84b86fc50c2b7e2b2
java-1.8.0-openjdk-src-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 525434e48b7dd24dd82c50156aa7ba24dd311c1c4e66a3e571635ef628d2e90d
Red Hat Enterprise Linux for IBM z Systems 9
SRPM
java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.src.rpm
SHA-256: ea7d32745e443ff392f974d800ba34da025546a3f44f5e8f456870c99bb197b7
s390x
java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: 98b23a464402945a3033b2a4335c2c8d6fe1a1c06d25add338bb42aa270ea81c
java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: 23a2d77209076b5a53a1897105d6ec7afc524af3fe08bab854d961c924dcf47c
java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: 49beb7680ee2e227c54403326c5e053805bf5bcb849c51c40f8503ac5c424bb0
java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: e300f73a86427d8098a1d111d8ece94704269d84b8989967515895c42d59e480
java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: d424bb46c218810d1597a113c48bbff2d108bd738eea95ecbdb7660801bf1752
java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: 6a8c363b6e1fddae82937f4b5810d4fe49f8ff926f6dae470ceb35e9ba3541cd
java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: 4132b9e8346d67391340516bcee5668e03b90ea59c25c57a30f33b21cb5e7984
java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: 629b245b507b7295b182ca98d111669bd35f726b227d1d07e7469fc310f593a5
java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: 36c78d53802fd6880bb88f6912a500513288e44bb8ce3603d656d6cabd8031c9
java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el9_0.noarch.rpm
SHA-256: 150700c210a6c1380cabc78224a895b1f92ec0903a750c5092dc96557042f4da
java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el9_0.noarch.rpm
SHA-256: 969e5cfd63770bb18e5af3da4e074807ed8b30052a324df84b86fc50c2b7e2b2
java-1.8.0-openjdk-src-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: 07df48562d7f3c821d9fd9a147e44b45883f74daf6b442369f7b468b211524c2
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.0
SRPM
java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.src.rpm
SHA-256: ea7d32745e443ff392f974d800ba34da025546a3f44f5e8f456870c99bb197b7
s390x
java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: 98b23a464402945a3033b2a4335c2c8d6fe1a1c06d25add338bb42aa270ea81c
java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: 23a2d77209076b5a53a1897105d6ec7afc524af3fe08bab854d961c924dcf47c
java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: 49beb7680ee2e227c54403326c5e053805bf5bcb849c51c40f8503ac5c424bb0
java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: e300f73a86427d8098a1d111d8ece94704269d84b8989967515895c42d59e480
java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: d424bb46c218810d1597a113c48bbff2d108bd738eea95ecbdb7660801bf1752
java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: 6a8c363b6e1fddae82937f4b5810d4fe49f8ff926f6dae470ceb35e9ba3541cd
java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: 4132b9e8346d67391340516bcee5668e03b90ea59c25c57a30f33b21cb5e7984
java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: 629b245b507b7295b182ca98d111669bd35f726b227d1d07e7469fc310f593a5
java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: 36c78d53802fd6880bb88f6912a500513288e44bb8ce3603d656d6cabd8031c9
java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el9_0.noarch.rpm
SHA-256: 150700c210a6c1380cabc78224a895b1f92ec0903a750c5092dc96557042f4da
java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el9_0.noarch.rpm
SHA-256: 969e5cfd63770bb18e5af3da4e074807ed8b30052a324df84b86fc50c2b7e2b2
java-1.8.0-openjdk-src-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: 07df48562d7f3c821d9fd9a147e44b45883f74daf6b442369f7b468b211524c2
Red Hat Enterprise Linux for Power, little endian 9
SRPM
java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.src.rpm
SHA-256: ea7d32745e443ff392f974d800ba34da025546a3f44f5e8f456870c99bb197b7
ppc64le
java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: ebe5f70b50e3875080235e0114ad4b17b8d40d74aca83dc2633f1c5eb1982721
java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: 21a10bc994e568864137fcf0069b8ba0ae45f50f95c4f356b2aac47cd339284a
java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: c2cd4360e3f9fc136d810c26c8d6ca5f73e845a3fe5e3b4f3d3e141ea113ae6e
java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: 4bb2fb4b0529d7c752f6a4f1372712d2ce5b0260b08e7371a23072640323df0b
java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: 9de60c4cdcd61b909724f7a37fd71082505fe02380fa14945fd52338a0b5cda5
java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: 17c8125e5eb41f14cca2864493a79950943267f878d24b49e09afaefc8fb7332
java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: fe7c9e9aeed799ab1ab2ecb734c7ea312e7607938999de2c549755867801931b
java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: a43f69280ab94a0110ab5abc00bf5f935cdf1b134c4afbb3749456bdbdff5f97
java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: bdaabb7ca75bccc039d28f53ac3e8025edadec0d4bdc0d103a27b1e36a8f9bc7
java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el9_0.noarch.rpm
SHA-256: 150700c210a6c1380cabc78224a895b1f92ec0903a750c5092dc96557042f4da
java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el9_0.noarch.rpm
SHA-256: 969e5cfd63770bb18e5af3da4e074807ed8b30052a324df84b86fc50c2b7e2b2
java-1.8.0-openjdk-src-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: 5b01ebeebb93acbcc8124f607c7181bbe360201bb2d204ea181b5ba6b6ea95e6
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0
SRPM
java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.src.rpm
SHA-256: ea7d32745e443ff392f974d800ba34da025546a3f44f5e8f456870c99bb197b7
ppc64le
java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: ebe5f70b50e3875080235e0114ad4b17b8d40d74aca83dc2633f1c5eb1982721
java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: 21a10bc994e568864137fcf0069b8ba0ae45f50f95c4f356b2aac47cd339284a
java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: c2cd4360e3f9fc136d810c26c8d6ca5f73e845a3fe5e3b4f3d3e141ea113ae6e
java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: 4bb2fb4b0529d7c752f6a4f1372712d2ce5b0260b08e7371a23072640323df0b
java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: 9de60c4cdcd61b909724f7a37fd71082505fe02380fa14945fd52338a0b5cda5
java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: 17c8125e5eb41f14cca2864493a79950943267f878d24b49e09afaefc8fb7332
java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: fe7c9e9aeed799ab1ab2ecb734c7ea312e7607938999de2c549755867801931b
java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: a43f69280ab94a0110ab5abc00bf5f935cdf1b134c4afbb3749456bdbdff5f97
java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: bdaabb7ca75bccc039d28f53ac3e8025edadec0d4bdc0d103a27b1e36a8f9bc7
java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el9_0.noarch.rpm
SHA-256: 150700c210a6c1380cabc78224a895b1f92ec0903a750c5092dc96557042f4da
java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el9_0.noarch.rpm
SHA-256: 969e5cfd63770bb18e5af3da4e074807ed8b30052a324df84b86fc50c2b7e2b2
java-1.8.0-openjdk-src-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: 5b01ebeebb93acbcc8124f607c7181bbe360201bb2d204ea181b5ba6b6ea95e6
Red Hat Enterprise Linux for ARM 64 9
SRPM
java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.src.rpm
SHA-256: ea7d32745e443ff392f974d800ba34da025546a3f44f5e8f456870c99bb197b7
aarch64
java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: c27eb535b50a457cecac64a83c06ab3d71f9f4a83f3596bb74f48e943bc50805
java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 0d88489e02b1e3b063930b6c84e7a4cf2ad44e59d168e49b7d4014e20534fdf3
java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: ac33015a80b8c1ea246c04ad940a371240b3397ff9568b28f1e6768b12ef202f
java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 2da864cae3c50e36cd6971d947f3b800428819b2b438320ada8a7d602bb59d8e
java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 9878b0a0fb4d88f716ff65eb6c7ef3cdd4b04486a3048ad859bf8237434063ae
java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 331c135f307844a05f549bee30736ef112517a1b1ffeffa38203d182a1bb78c6
java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 23836c5a741b859415e84f1f11172ebff32c390e3475887fa7c06c12731c3626
java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: cc2ce50c8f25736fa30013be2f4e4f7edf03228ef7b2c3244c6c7f3527046376
java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 67e670aea870b751a431f2a20f4c94e93075c6c4de0b170eee6a9dfa5f705e7f
java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el9_0.noarch.rpm
SHA-256: 150700c210a6c1380cabc78224a895b1f92ec0903a750c5092dc96557042f4da
java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el9_0.noarch.rpm
SHA-256: 969e5cfd63770bb18e5af3da4e074807ed8b30052a324df84b86fc50c2b7e2b2
java-1.8.0-openjdk-src-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 744d043ddac761183a3813398e250b8312eea6bdc3a06e63061f0dfc7a40b42c
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0
SRPM
java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.src.rpm
SHA-256: ea7d32745e443ff392f974d800ba34da025546a3f44f5e8f456870c99bb197b7
ppc64le
java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: ebe5f70b50e3875080235e0114ad4b17b8d40d74aca83dc2633f1c5eb1982721
java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: 21a10bc994e568864137fcf0069b8ba0ae45f50f95c4f356b2aac47cd339284a
java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: c2cd4360e3f9fc136d810c26c8d6ca5f73e845a3fe5e3b4f3d3e141ea113ae6e
java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: 4bb2fb4b0529d7c752f6a4f1372712d2ce5b0260b08e7371a23072640323df0b
java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: 9de60c4cdcd61b909724f7a37fd71082505fe02380fa14945fd52338a0b5cda5
java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: 17c8125e5eb41f14cca2864493a79950943267f878d24b49e09afaefc8fb7332
java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: fe7c9e9aeed799ab1ab2ecb734c7ea312e7607938999de2c549755867801931b
java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: a43f69280ab94a0110ab5abc00bf5f935cdf1b134c4afbb3749456bdbdff5f97
java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: bdaabb7ca75bccc039d28f53ac3e8025edadec0d4bdc0d103a27b1e36a8f9bc7
java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el9_0.noarch.rpm
SHA-256: 150700c210a6c1380cabc78224a895b1f92ec0903a750c5092dc96557042f4da
java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el9_0.noarch.rpm
SHA-256: 969e5cfd63770bb18e5af3da4e074807ed8b30052a324df84b86fc50c2b7e2b2
java-1.8.0-openjdk-src-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: 5b01ebeebb93acbcc8124f607c7181bbe360201bb2d204ea181b5ba6b6ea95e6
Red Hat Enterprise Linux Server for x86_64 - Update Services for SAP Solutions 9.0
SRPM
java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.src.rpm
SHA-256: ea7d32745e443ff392f974d800ba34da025546a3f44f5e8f456870c99bb197b7
x86_64
java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: bb8ed5dfb786b1757246dfa3ce795aa9ea72a0c31fa282a323ee8fa5d4c0419a
java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 89c07b6deee1723716d1032bc2e5b23d5cebf06d6f0d0dd4dcc9882a4ebf56ec
java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 02a93d22de8b24d10e28a310bfb14df5a8c99f15bf80877eac4b98b0e431896d
java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 91326283c6f56416e09c3504229df18264217ca719eeab9547b94f6f1ff00c2a
java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 351858293760ef252c8d18c8e6dae09903b2254a0cc63e5ce93d17dd4df7d22f
java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 8a2031e11e58c0518768d8b3e5b3f29d00a1faf78f6ac70f55389e383b4ffb92
java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: d069196e88ae50deca2a411a276729f400bc1c857446f4c4fb25aa4ee423f099
java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 15bd6ff347cf5a480d0b3c70bfcfd6f8d8b3f2b89cfb0db83c8b6dbbc6b81317
java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: b6bd18fe32acec3dedb2263dfc1879b48266bbef163c366d9c473ccd633f2f7f
java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el9_0.noarch.rpm
SHA-256: 150700c210a6c1380cabc78224a895b1f92ec0903a750c5092dc96557042f4da
java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el9_0.noarch.rpm
SHA-256: 969e5cfd63770bb18e5af3da4e074807ed8b30052a324df84b86fc50c2b7e2b2
java-1.8.0-openjdk-src-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 525434e48b7dd24dd82c50156aa7ba24dd311c1c4e66a3e571635ef628d2e90d
Red Hat CodeReady Linux Builder for x86_64 9
SRPM
x86_64
java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 89c07b6deee1723716d1032bc2e5b23d5cebf06d6f0d0dd4dcc9882a4ebf56ec
java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 02a93d22de8b24d10e28a310bfb14df5a8c99f15bf80877eac4b98b0e431896d
java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 351858293760ef252c8d18c8e6dae09903b2254a0cc63e5ce93d17dd4df7d22f
java-1.8.0-openjdk-demo-fastdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: fe6adba0d99e383b1c3c0a08ef0f917982b97d103bcb0292c8513d814f54f954
java-1.8.0-openjdk-demo-slowdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 4ebaf5a0b22593e777f3084c7e5bcfa93edabe363926c98b81743d84e79b56e1
java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: d069196e88ae50deca2a411a276729f400bc1c857446f4c4fb25aa4ee423f099
java-1.8.0-openjdk-devel-fastdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 47567c5a19f0fbda5e757bb494796b2f2997adc605664b8eb01222e9135535f1
java-1.8.0-openjdk-devel-slowdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: c27792bda17be0dae7a84aa8be70c6645e466fb5c7b33152f0af0ba3ddb7e497
java-1.8.0-openjdk-fastdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 515412db7a4b2fd294d2dfcb72dc4210ed679d5370f29b8a165e6c008d892412
java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: b6bd18fe32acec3dedb2263dfc1879b48266bbef163c366d9c473ccd633f2f7f
java-1.8.0-openjdk-headless-fastdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 6aa7dfd7f0b60d074d44ce59b3be07b1f207dbc7a6011812c963228bd38b8a3a
java-1.8.0-openjdk-headless-slowdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: dfe7545b670751847b1eb46b93ec177b0404144e2d15ee94886258c0b630451b
java-1.8.0-openjdk-slowdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 4ae432522635edce03d91be1187451439a16efc812d4679bbe4311f548959125
java-1.8.0-openjdk-src-fastdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: a7aa9af094da2c9d19976353c339a3c189210eb60b36efb3077bf759a8314985
java-1.8.0-openjdk-src-slowdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 0689f5d6fdc71a74fba948f918398da089d1efb83a79ad19355052963691164b
Red Hat CodeReady Linux Builder for Power, little endian 9
SRPM
ppc64le
java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: 21a10bc994e568864137fcf0069b8ba0ae45f50f95c4f356b2aac47cd339284a
java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: c2cd4360e3f9fc136d810c26c8d6ca5f73e845a3fe5e3b4f3d3e141ea113ae6e
java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: 9de60c4cdcd61b909724f7a37fd71082505fe02380fa14945fd52338a0b5cda5
java-1.8.0-openjdk-demo-fastdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: db13744e5454028402dcacebc01bf9d642991aa5bec26ed7fec3b1febd29ac36
java-1.8.0-openjdk-demo-slowdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: a15994435fce8a6ce3e20cd54534388da4b30dd1fc611d685981bbf880bb2dd6
java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: fe7c9e9aeed799ab1ab2ecb734c7ea312e7607938999de2c549755867801931b
java-1.8.0-openjdk-devel-fastdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: e8b4b945432a90d24dee7ec871ed30b507eb841c9369bd28064ad4a053118af4
java-1.8.0-openjdk-devel-slowdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: 13884025bf2229b5cf911f3150980d5c4e8dc6da7eb4d9591e9e63a2d9ad09f2
java-1.8.0-openjdk-fastdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: b6f8b19071f90edb586547942e85840f0fbe9146b94855055dd5d0a2495b0cb3
java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: bdaabb7ca75bccc039d28f53ac3e8025edadec0d4bdc0d103a27b1e36a8f9bc7
java-1.8.0-openjdk-headless-fastdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: b89588eb6ec47d7f5d1d2dd88ae5ce10189249b3c46c4183bfbc6aa69c972e4e
java-1.8.0-openjdk-headless-slowdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: e968f345231a1b0da069be821082e434bf0314794548de35c56ce75c799dcbcb
java-1.8.0-openjdk-slowdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: cd4e37a2484a339e1a2aaeec07a84df13aadac2bcd0923a416c8529c79bdbf6b
java-1.8.0-openjdk-src-fastdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: cbbc22d3506c5eba65725df5d94a07f89f5556107cb8ede92a70dbd667c7b986
java-1.8.0-openjdk-src-slowdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: 6abcc9513bde053e471ab4d2e77a0083e80f4ece852d01e3ae64f6d0ce0b6095
Red Hat CodeReady Linux Builder for ARM 64 9
SRPM
aarch64
java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 0d88489e02b1e3b063930b6c84e7a4cf2ad44e59d168e49b7d4014e20534fdf3
java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: ac33015a80b8c1ea246c04ad940a371240b3397ff9568b28f1e6768b12ef202f
java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 9878b0a0fb4d88f716ff65eb6c7ef3cdd4b04486a3048ad859bf8237434063ae
java-1.8.0-openjdk-demo-fastdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: c2172984e1652b055846207544994ab5e39798e8e018f7f355adcf9468bb651f
java-1.8.0-openjdk-demo-slowdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 4cf1ab1d6b392ccfbb3e4a519e7e6e4d444a932600da59eb316244732ef9721f
java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 23836c5a741b859415e84f1f11172ebff32c390e3475887fa7c06c12731c3626
java-1.8.0-openjdk-devel-fastdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 8bc952be5ec1d8a0e3e84cf5681637b06fa6963a5914f926ff920242cfbc2dbf
java-1.8.0-openjdk-devel-slowdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 01255973bc0981f3da10b83e28023ec901ded0b89cc3e1d416f510266185b1ba
java-1.8.0-openjdk-fastdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 4b0631785484d067317855409f72c1c3799419d7e859cdd227f3831aeab018e8
java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 67e670aea870b751a431f2a20f4c94e93075c6c4de0b170eee6a9dfa5f705e7f
java-1.8.0-openjdk-headless-fastdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 82a9dc27e23b06844fcb5dc9ce73f68e4860650b35b3e953841ed5069ecc3237
java-1.8.0-openjdk-headless-slowdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: fa4deadec6bf6c976a33ccd367f7b2540a0e37e7ae3ae3926cc1508f5cb18870
java-1.8.0-openjdk-slowdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: d27432d29cfdf68e69373a1771c8bfb077c703f14b45ba4e6996ee165a84b395
java-1.8.0-openjdk-src-fastdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 883e05eb24f72cdd1889a5cfc16e4886687b7404fcf5b6aff9ce6d8b17d7c9c2
java-1.8.0-openjdk-src-slowdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 4ab4d169b53be2f871f2e10a64ebb0ea5ab07ed76fa2383bc320a9100d864ba7
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0
SRPM
java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.src.rpm
SHA-256: ea7d32745e443ff392f974d800ba34da025546a3f44f5e8f456870c99bb197b7
aarch64
java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: c27eb535b50a457cecac64a83c06ab3d71f9f4a83f3596bb74f48e943bc50805
java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 0d88489e02b1e3b063930b6c84e7a4cf2ad44e59d168e49b7d4014e20534fdf3
java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: ac33015a80b8c1ea246c04ad940a371240b3397ff9568b28f1e6768b12ef202f
java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 2da864cae3c50e36cd6971d947f3b800428819b2b438320ada8a7d602bb59d8e
java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 9878b0a0fb4d88f716ff65eb6c7ef3cdd4b04486a3048ad859bf8237434063ae
java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 331c135f307844a05f549bee30736ef112517a1b1ffeffa38203d182a1bb78c6
java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 23836c5a741b859415e84f1f11172ebff32c390e3475887fa7c06c12731c3626
java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: cc2ce50c8f25736fa30013be2f4e4f7edf03228ef7b2c3244c6c7f3527046376
java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 67e670aea870b751a431f2a20f4c94e93075c6c4de0b170eee6a9dfa5f705e7f
java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el9_0.noarch.rpm
SHA-256: 150700c210a6c1380cabc78224a895b1f92ec0903a750c5092dc96557042f4da
java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el9_0.noarch.rpm
SHA-256: 969e5cfd63770bb18e5af3da4e074807ed8b30052a324df84b86fc50c2b7e2b2
java-1.8.0-openjdk-src-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 744d043ddac761183a3813398e250b8312eea6bdc3a06e63061f0dfc7a40b42c
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 9.0
SRPM
x86_64
java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 89c07b6deee1723716d1032bc2e5b23d5cebf06d6f0d0dd4dcc9882a4ebf56ec
java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 02a93d22de8b24d10e28a310bfb14df5a8c99f15bf80877eac4b98b0e431896d
java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 351858293760ef252c8d18c8e6dae09903b2254a0cc63e5ce93d17dd4df7d22f
java-1.8.0-openjdk-demo-fastdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: fe6adba0d99e383b1c3c0a08ef0f917982b97d103bcb0292c8513d814f54f954
java-1.8.0-openjdk-demo-slowdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 4ebaf5a0b22593e777f3084c7e5bcfa93edabe363926c98b81743d84e79b56e1
java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: d069196e88ae50deca2a411a276729f400bc1c857446f4c4fb25aa4ee423f099
java-1.8.0-openjdk-devel-fastdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 47567c5a19f0fbda5e757bb494796b2f2997adc605664b8eb01222e9135535f1
java-1.8.0-openjdk-devel-slowdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: c27792bda17be0dae7a84aa8be70c6645e466fb5c7b33152f0af0ba3ddb7e497
java-1.8.0-openjdk-fastdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 515412db7a4b2fd294d2dfcb72dc4210ed679d5370f29b8a165e6c008d892412
java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: b6bd18fe32acec3dedb2263dfc1879b48266bbef163c366d9c473ccd633f2f7f
java-1.8.0-openjdk-headless-fastdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 6aa7dfd7f0b60d074d44ce59b3be07b1f207dbc7a6011812c963228bd38b8a3a
java-1.8.0-openjdk-headless-slowdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: dfe7545b670751847b1eb46b93ec177b0404144e2d15ee94886258c0b630451b
java-1.8.0-openjdk-slowdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 4ae432522635edce03d91be1187451439a16efc812d4679bbe4311f548959125
java-1.8.0-openjdk-src-fastdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: a7aa9af094da2c9d19976353c339a3c189210eb60b36efb3077bf759a8314985
java-1.8.0-openjdk-src-slowdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm
SHA-256: 0689f5d6fdc71a74fba948f918398da089d1efb83a79ad19355052963691164b
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 9.0
SRPM
ppc64le
java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: 21a10bc994e568864137fcf0069b8ba0ae45f50f95c4f356b2aac47cd339284a
java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: c2cd4360e3f9fc136d810c26c8d6ca5f73e845a3fe5e3b4f3d3e141ea113ae6e
java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: 9de60c4cdcd61b909724f7a37fd71082505fe02380fa14945fd52338a0b5cda5
java-1.8.0-openjdk-demo-fastdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: db13744e5454028402dcacebc01bf9d642991aa5bec26ed7fec3b1febd29ac36
java-1.8.0-openjdk-demo-slowdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: a15994435fce8a6ce3e20cd54534388da4b30dd1fc611d685981bbf880bb2dd6
java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: fe7c9e9aeed799ab1ab2ecb734c7ea312e7607938999de2c549755867801931b
java-1.8.0-openjdk-devel-fastdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: e8b4b945432a90d24dee7ec871ed30b507eb841c9369bd28064ad4a053118af4
java-1.8.0-openjdk-devel-slowdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: 13884025bf2229b5cf911f3150980d5c4e8dc6da7eb4d9591e9e63a2d9ad09f2
java-1.8.0-openjdk-fastdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: b6f8b19071f90edb586547942e85840f0fbe9146b94855055dd5d0a2495b0cb3
java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: bdaabb7ca75bccc039d28f53ac3e8025edadec0d4bdc0d103a27b1e36a8f9bc7
java-1.8.0-openjdk-headless-fastdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: b89588eb6ec47d7f5d1d2dd88ae5ce10189249b3c46c4183bfbc6aa69c972e4e
java-1.8.0-openjdk-headless-slowdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: e968f345231a1b0da069be821082e434bf0314794548de35c56ce75c799dcbcb
java-1.8.0-openjdk-slowdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: cd4e37a2484a339e1a2aaeec07a84df13aadac2bcd0923a416c8529c79bdbf6b
java-1.8.0-openjdk-src-fastdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: cbbc22d3506c5eba65725df5d94a07f89f5556107cb8ede92a70dbd667c7b986
java-1.8.0-openjdk-src-slowdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm
SHA-256: 6abcc9513bde053e471ab4d2e77a0083e80f4ece852d01e3ae64f6d0ce0b6095
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 9.0
SRPM
aarch64
java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 0d88489e02b1e3b063930b6c84e7a4cf2ad44e59d168e49b7d4014e20534fdf3
java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: ac33015a80b8c1ea246c04ad940a371240b3397ff9568b28f1e6768b12ef202f
java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 9878b0a0fb4d88f716ff65eb6c7ef3cdd4b04486a3048ad859bf8237434063ae
java-1.8.0-openjdk-demo-fastdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: c2172984e1652b055846207544994ab5e39798e8e018f7f355adcf9468bb651f
java-1.8.0-openjdk-demo-slowdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 4cf1ab1d6b392ccfbb3e4a519e7e6e4d444a932600da59eb316244732ef9721f
java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 23836c5a741b859415e84f1f11172ebff32c390e3475887fa7c06c12731c3626
java-1.8.0-openjdk-devel-fastdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 8bc952be5ec1d8a0e3e84cf5681637b06fa6963a5914f926ff920242cfbc2dbf
java-1.8.0-openjdk-devel-slowdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 01255973bc0981f3da10b83e28023ec901ded0b89cc3e1d416f510266185b1ba
java-1.8.0-openjdk-fastdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 4b0631785484d067317855409f72c1c3799419d7e859cdd227f3831aeab018e8
java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 67e670aea870b751a431f2a20f4c94e93075c6c4de0b170eee6a9dfa5f705e7f
java-1.8.0-openjdk-headless-fastdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 82a9dc27e23b06844fcb5dc9ce73f68e4860650b35b3e953841ed5069ecc3237
java-1.8.0-openjdk-headless-slowdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: fa4deadec6bf6c976a33ccd367f7b2540a0e37e7ae3ae3926cc1508f5cb18870
java-1.8.0-openjdk-slowdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: d27432d29cfdf68e69373a1771c8bfb077c703f14b45ba4e6996ee165a84b395
java-1.8.0-openjdk-src-fastdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 883e05eb24f72cdd1889a5cfc16e4886687b7404fcf5b6aff9ce6d8b17d7c9c2
java-1.8.0-openjdk-src-slowdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 4ab4d169b53be2f871f2e10a64ebb0ea5ab07ed76fa2383bc320a9100d864ba7
Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0
SRPM
java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.src.rpm
SHA-256: ea7d32745e443ff392f974d800ba34da025546a3f44f5e8f456870c99bb197b7
aarch64
java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: c27eb535b50a457cecac64a83c06ab3d71f9f4a83f3596bb74f48e943bc50805
java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 0d88489e02b1e3b063930b6c84e7a4cf2ad44e59d168e49b7d4014e20534fdf3
java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: ac33015a80b8c1ea246c04ad940a371240b3397ff9568b28f1e6768b12ef202f
java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 2da864cae3c50e36cd6971d947f3b800428819b2b438320ada8a7d602bb59d8e
java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 9878b0a0fb4d88f716ff65eb6c7ef3cdd4b04486a3048ad859bf8237434063ae
java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 331c135f307844a05f549bee30736ef112517a1b1ffeffa38203d182a1bb78c6
java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 23836c5a741b859415e84f1f11172ebff32c390e3475887fa7c06c12731c3626
java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: cc2ce50c8f25736fa30013be2f4e4f7edf03228ef7b2c3244c6c7f3527046376
java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 67e670aea870b751a431f2a20f4c94e93075c6c4de0b170eee6a9dfa5f705e7f
java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el9_0.noarch.rpm
SHA-256: 150700c210a6c1380cabc78224a895b1f92ec0903a750c5092dc96557042f4da
java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el9_0.noarch.rpm
SHA-256: 969e5cfd63770bb18e5af3da4e074807ed8b30052a324df84b86fc50c2b7e2b2
java-1.8.0-openjdk-src-1.8.0.332.b09-1.el9_0.aarch64.rpm
SHA-256: 744d043ddac761183a3813398e250b8312eea6bdc3a06e63061f0dfc7a40b42c
Red Hat Enterprise Linux Server for IBM z Systems - 4 years of updates 9.0
SRPM
java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.src.rpm
SHA-256: ea7d32745e443ff392f974d800ba34da025546a3f44f5e8f456870c99bb197b7
s390x
java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: 98b23a464402945a3033b2a4335c2c8d6fe1a1c06d25add338bb42aa270ea81c
java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: 23a2d77209076b5a53a1897105d6ec7afc524af3fe08bab854d961c924dcf47c
java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: 49beb7680ee2e227c54403326c5e053805bf5bcb849c51c40f8503ac5c424bb0
java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: e300f73a86427d8098a1d111d8ece94704269d84b8989967515895c42d59e480
java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: d424bb46c218810d1597a113c48bbff2d108bd738eea95ecbdb7660801bf1752
java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: 6a8c363b6e1fddae82937f4b5810d4fe49f8ff926f6dae470ceb35e9ba3541cd
java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: 4132b9e8346d67391340516bcee5668e03b90ea59c25c57a30f33b21cb5e7984
java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: 629b245b507b7295b182ca98d111669bd35f726b227d1d07e7469fc310f593a5
java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: 36c78d53802fd6880bb88f6912a500513288e44bb8ce3603d656d6cabd8031c9
java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el9_0.noarch.rpm
SHA-256: 150700c210a6c1380cabc78224a895b1f92ec0903a750c5092dc96557042f4da
java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el9_0.noarch.rpm
SHA-256: 969e5cfd63770bb18e5af3da4e074807ed8b30052a324df84b86fc50c2b7e2b2
java-1.8.0-openjdk-src-1.8.0.332.b09-1.el9_0.s390x.rpm
SHA-256: 07df48562d7f3c821d9fd9a147e44b45883f74daf6b442369f7b468b211524c2
Related news
IBM QRadar SIEM 7.5.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 254138
IBM Security Guardium 11.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 240905.
Progress Chef Infra Server before 15.7 allows a local attacker to exploit a /var/opt/opscode/local-mode-cache/backup world-readable temporary backup path to access sensitive information, resulting in the disclosure of all indexed node data, because OpenSearch credentials are exposed. (The data typically includes credentials for additional systems.) The attacker must wait for an admin to run the "chef-server-ctl reconfigure" command.
Dell PowerStore versions prior to 3.5 contain an improper verification of cryptographic signature vulnerability. An attacker can trick a high privileged user to install a malicious binary by bypassing the existing cryptographic signature checks
An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 7 Supplementary. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated...
Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.
Unisphere for PowerMax versions before 9.2.3.15 contain a privilege escalation vulnerability. An adjacent malicious user may potentially exploit this vulnerability to escalate their privileges and access functionalities they do not have access to.
Ubuntu Security Notice 5546-1 - Neil Madden discovered that OpenJDK did not properly verify ECDSA signatures. A remote attacker could possibly use this issue to insert, edit or obtain sensitive information. This issue only affected OpenJDK 17 and OpenJDK 18. It was discovered that OpenJDK incorrectly limited memory when compiling a specially crafted XPath expression. An attacker could possibly use this issue to cause a denial of service. This issue was fixed in OpenJDK 8 and OpenJDK 18. USN-5388-1 and USN-5388-2 addressed this issue in OpenJDK 11 and OpenJDK 17.
Ubuntu Security Notice 5546-2 - USN-5546-1 fixed vulnerabilities in OpenJDK. This update provides the corresponding updates for Ubuntu 16.04 ESM. Neil Madden discovered that OpenJDK did not properly verify ECDSA signatures. A remote attacker could possibly use this issue to insert, edit or obtain sensitive information. This issue only affected OpenJDK 17 and OpenJDK 18.
An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-35561: OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21496: OpenJDK: URI parsing inconsistencies...
Red Hat Security Advisory 2022-4959-01 - IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR7-FP10.
An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 7 Supplementary. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-35561: OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21496: OpenJDK: URI parsing i...
Red Hat Security Advisory 2022-1728-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Red Hat Security Advisory 2022-1729-01 - The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.
Red Hat Security Advisory 2022-2137-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Red Hat Security Advisory 2022-2281-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 3.11.705.
Red Hat OpenShift Container Platform release 3.11.705 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 3.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1677: openshift/router: route hijacking attack via crafted HAProxy configuration file
Red Hat OpenShift Container Platform release 4.8.41 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-1677: openshift/router: route hijacking attack via crafted HAProxy configuration file
An update for java-17-openjdk is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21449: OpenJDK: Improper E...
An update for java-17-openjdk is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21449: OpenJDK: Improper E...
An update for java-17-openjdk is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21449: OpenJDK: Improper E...
An update for java-17-openjdk is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21449: OpenJDK: Improper E...
An update for java-17-openjdk is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21449: OpenJDK: Improper E...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21476: OpenJDK: Defective ...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21476: OpenJDK: Defective ...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21476: OpenJDK: Defective ...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21476: OpenJDK: Defective ...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21426: OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) * CVE-2022-21434: OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) * CVE-2022-21443: OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) * CVE-2022-21476: OpenJDK: Defective ...
Red Hat Security Advisory 2022-1699-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.50.
Red Hat Security Advisory 2022-1699-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.50.
Red Hat Security Advisory 2022-1699-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.50.
Red Hat Security Advisory 2022-1699-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.50.
Red Hat Security Advisory 2022-1699-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.7.50.
Red Hat OpenShift Container Platform release 4.7.50 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.7 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24769: moby: Default inheritable capabilities for linux container should be empty
Red Hat OpenShift Container Platform release 4.7.50 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.7 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24769: moby: Default inheritable capabilities for linux container should be empty
Red Hat OpenShift Container Platform release 4.7.50 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.7 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24769: moby: Default inheritable capabilities for linux container should be empty
Red Hat OpenShift Container Platform release 4.7.50 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.7 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24769: moby: Default inheritable capabilities for linux container should be empty
Red Hat OpenShift Container Platform release 4.7.50 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.7 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-24769: moby: Default inheritable capabilities for linux container should be empty
Red Hat Security Advisory 2022-2216-01 - Logging Subsystem 5.4.1 - Red Hat OpenShift. Issues addressed include HTTP request smuggling and denial of service vulnerabilities.
Red Hat Security Advisory 2022-2216-01 - Logging Subsystem 5.4.1 - Red Hat OpenShift. Issues addressed include HTTP request smuggling and denial of service vulnerabilities.
Red Hat Security Advisory 2022-2216-01 - Logging Subsystem 5.4.1 - Red Hat OpenShift. Issues addressed include HTTP request smuggling and denial of service vulnerabilities.
Red Hat Security Advisory 2022-2216-01 - Logging Subsystem 5.4.1 - Red Hat OpenShift. Issues addressed include HTTP request smuggling and denial of service vulnerabilities.
Red Hat Security Advisory 2022-2216-01 - Logging Subsystem 5.4.1 - Red Hat OpenShift. Issues addressed include HTTP request smuggling and denial of service vulnerabilities.
Openshift Logging Bug Fix Release (5.3.7) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data * CVE-2021-37137: netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way * CVE-2021-43797: netty: control chars in header names may lead to HTTP request smuggling * CVE-2022-0759: kubeclient: kubeconfig parsing error can lead to...
Openshift Logging Bug Fix Release (5.3.7) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data * CVE-2021-37137: netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way * CVE-2021-43797: netty: control chars in header names may lead to HTTP request smuggling * CVE-2022-0759: kubeclient: kubeconfig parsing error can lead to...
Openshift Logging Bug Fix Release (5.3.7) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data * CVE-2021-37137: netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way * CVE-2021-43797: netty: control chars in header names may lead to HTTP request smuggling * CVE-2022-0759: kubeclient: kubeconfig parsing error can lead to...
Openshift Logging Bug Fix Release (5.3.7) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data * CVE-2021-37137: netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way * CVE-2021-43797: netty: control chars in header names may lead to HTTP request smuggling * CVE-2022-0759: kubeclient: kubeconfig parsing error can lead to...
Openshift Logging Bug Fix Release (5.3.7) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data * CVE-2021-37137: netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way * CVE-2021-43797: netty: control chars in header names may lead to HTTP request smuggling * CVE-2022-0759: kubeclient: kubeconfig parsing error can lead to...
Openshift Logging Bug Fix Release (5.2.10) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data * CVE-2021-37137: netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way * CVE-2021-43797: netty: control chars in header names may lead to HTTP request smuggling * CVE-2022-0759: kubeclient: kubeconfig parsing error can lead t...
Logging Subsystem 5.4.1 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data * CVE-2021-37137: netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way * CVE-2021-43797: netty: control chars in header names may lead to HTTP request smuggling * CVE-2022-21698: prometheus/client_golang: Denial of service u...
Logging Subsystem 5.4.1 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data * CVE-2021-37137: netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way * CVE-2021-43797: netty: control chars in header names may lead to HTTP request smuggling * CVE-2022-21698: prometheus/client_golang: Denial of service u...
Logging Subsystem 5.4.1 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data * CVE-2021-37137: netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way * CVE-2021-43797: netty: control chars in header names may lead to HTTP request smuggling * CVE-2022-21698: prometheus/client_golang: Denial of service u...
Logging Subsystem 5.4.1 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data * CVE-2021-37137: netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way * CVE-2021-43797: netty: control chars in header names may lead to HTTP request smuggling * CVE-2022-21698: prometheus/client_golang: Denial of service u...
Logging Subsystem 5.4.1 - Red Hat OpenShift Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-37136: netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data * CVE-2021-37137: netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way * CVE-2021-43797: netty: control chars in header names may lead to HTTP request smuggling * CVE-2022-21698: prometheus/client_golang: Denial of service u...
New Cryostat 2.1.0 on RHEL 8 container images are now availableThis content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3121: gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
New Cryostat 2.1.0 on RHEL 8 container images are now availableThis content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3121: gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
New Cryostat 2.1.0 on RHEL 8 container images are now availableThis content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3121: gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
New Cryostat 2.1.0 on RHEL 8 container images are now availableThis content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3121: gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
New Cryostat 2.1.0 on RHEL 8 container images are now availableThis content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-3121: gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
Red Hat Security Advisory 2022-1747-01 - OpenShift Serverless version 1.22.0 contains a moderate security impact. The References section contains CVE links providing detailed severity ratings for each vulnerability.
Red Hat Security Advisory 2022-1747-01 - OpenShift Serverless version 1.22.0 contains a moderate security impact. The References section contains CVE links providing detailed severity ratings for each vulnerability.
Red Hat Security Advisory 2022-1747-01 - OpenShift Serverless version 1.22.0 contains a moderate security impact. The References section contains CVE links providing detailed severity ratings for each vulnerability.
Red Hat Security Advisory 2022-1747-01 - OpenShift Serverless version 1.22.0 contains a moderate security impact. The References section contains CVE links providing detailed severity ratings for each vulnerability.
Red Hat Security Advisory 2022-1747-01 - OpenShift Serverless version 1.22.0 contains a moderate security impact. The References section contains CVE links providing detailed severity ratings for each vulnerability.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service ...
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service ...
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service ...
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service ...
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service ...