Headline
RHSA-2023:0207: Red Hat Security Advisory: java-1.8.0-openjdk security update
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2023-21830: OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021)
- CVE-2023-21843: OpenJDK: soundbank URL remote loading (Sound, 8293742)
概要
Moderate: java-1.8.0-openjdk security update
タイプ/重大度
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
トピック
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
説明
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
- OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) (CVE-2023-21830)
- OpenJDK: soundbank URL remote loading (Sound, 8293742) (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
解決法
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
All running instances of OpenJDK Java must be restarted for this update to take effect.
影響を受ける製品
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64
修正
- BZ - 2160475 - CVE-2023-21843 OpenJDK: soundbank URL remote loading (Sound, 8293742)
- BZ - 2160490 - CVE-2023-21830 OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021)
参考資料
- https://access.redhat.com/security/updates/classification/#moderate
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM
java-1.8.0-openjdk-1.8.0.362.b08-1.el8_6.src.rpm
SHA-256: 6edf3b8756615d79d782c9b3a0e7686a48560f221d446e80f5e41a3a64e04229
x86_64
java-1.8.0-openjdk-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 63b5d72a1cff9abc71905a86d7fccd74c1fbda288f5e77ee37d8bc54aecd7c8f
java-1.8.0-openjdk-accessibility-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: f8736ff0c9a9b691346568a8d56e22d234dc5ee5daaff4f74ea5f5259ef72154
java-1.8.0-openjdk-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 3335a79103a252bd69cab8a9727294dd160c80b15622ac11037ccf0f009f24b8
java-1.8.0-openjdk-debugsource-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 0a7fc603701e8a9793588d94a5c1086f2ff1c6ec042533bbb32877163678560a
java-1.8.0-openjdk-demo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 124bfb9c6cb14e64d7c5de69e80a8063c07df7a1dc14b97eacb8346bb2488494
java-1.8.0-openjdk-demo-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 35db08a6cb120ca2e7131666c70110d698ddfc4b60aebe84368644f70edcb704
java-1.8.0-openjdk-devel-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 694f41632aff8b6a84c6919cfd68240db6e62291cc30c8fb48ee23ec12451a35
java-1.8.0-openjdk-devel-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 5499dffb3f48f619dc37356acd5aa29c4b292f79565795267fff99bf94421bde
java-1.8.0-openjdk-headless-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: e31f68ca03a83257550193612a1b83d21f439cbcb79d33d10b0cb2a23491bc60
java-1.8.0-openjdk-headless-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 85d345c82d9cd4cd5896fe99e52fa2f3f3b8a8944f6ef511bf41c3d09b80ce25
java-1.8.0-openjdk-javadoc-1.8.0.362.b08-1.el8_6.noarch.rpm
SHA-256: b56a8808fba5dae958a9a030d330f0325e1e2da62cf8b82848dd2f51188edf33
java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b08-1.el8_6.noarch.rpm
SHA-256: e839fa227e70e52166f377c01cd9bf07d6317785b4f24a33bd3479210deb1dc0
java-1.8.0-openjdk-src-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 3cc1148766fcc7f111c66f4a5f60135030a79699286d08ac13ab497e954c77d1
Red Hat Enterprise Linux Server - AUS 8.6
SRPM
java-1.8.0-openjdk-1.8.0.362.b08-1.el8_6.src.rpm
SHA-256: 6edf3b8756615d79d782c9b3a0e7686a48560f221d446e80f5e41a3a64e04229
x86_64
java-1.8.0-openjdk-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 63b5d72a1cff9abc71905a86d7fccd74c1fbda288f5e77ee37d8bc54aecd7c8f
java-1.8.0-openjdk-accessibility-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: f8736ff0c9a9b691346568a8d56e22d234dc5ee5daaff4f74ea5f5259ef72154
java-1.8.0-openjdk-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 3335a79103a252bd69cab8a9727294dd160c80b15622ac11037ccf0f009f24b8
java-1.8.0-openjdk-debugsource-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 0a7fc603701e8a9793588d94a5c1086f2ff1c6ec042533bbb32877163678560a
java-1.8.0-openjdk-demo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 124bfb9c6cb14e64d7c5de69e80a8063c07df7a1dc14b97eacb8346bb2488494
java-1.8.0-openjdk-demo-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 35db08a6cb120ca2e7131666c70110d698ddfc4b60aebe84368644f70edcb704
java-1.8.0-openjdk-devel-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 694f41632aff8b6a84c6919cfd68240db6e62291cc30c8fb48ee23ec12451a35
java-1.8.0-openjdk-devel-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 5499dffb3f48f619dc37356acd5aa29c4b292f79565795267fff99bf94421bde
java-1.8.0-openjdk-headless-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: e31f68ca03a83257550193612a1b83d21f439cbcb79d33d10b0cb2a23491bc60
java-1.8.0-openjdk-headless-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 85d345c82d9cd4cd5896fe99e52fa2f3f3b8a8944f6ef511bf41c3d09b80ce25
java-1.8.0-openjdk-javadoc-1.8.0.362.b08-1.el8_6.noarch.rpm
SHA-256: b56a8808fba5dae958a9a030d330f0325e1e2da62cf8b82848dd2f51188edf33
java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b08-1.el8_6.noarch.rpm
SHA-256: e839fa227e70e52166f377c01cd9bf07d6317785b4f24a33bd3479210deb1dc0
java-1.8.0-openjdk-src-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 3cc1148766fcc7f111c66f4a5f60135030a79699286d08ac13ab497e954c77d1
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6
SRPM
java-1.8.0-openjdk-1.8.0.362.b08-1.el8_6.src.rpm
SHA-256: 6edf3b8756615d79d782c9b3a0e7686a48560f221d446e80f5e41a3a64e04229
s390x
java-1.8.0-openjdk-1.8.0.362.b08-1.el8_6.s390x.rpm
SHA-256: a2d673976554bbdabeae24e564e98f173cbe58774d1d64812806153336a5faf0
java-1.8.0-openjdk-accessibility-1.8.0.362.b08-1.el8_6.s390x.rpm
SHA-256: e73f902f2f1e67d383083cc98be17bd364066496fa5be42c74a2f648299c0ce9
java-1.8.0-openjdk-debuginfo-1.8.0.362.b08-1.el8_6.s390x.rpm
SHA-256: 713d9a14799f06e7c0231595c1830b6e0acf042f6fbf65b5806bd807ba301375
java-1.8.0-openjdk-debugsource-1.8.0.362.b08-1.el8_6.s390x.rpm
SHA-256: 6096cd6d1499faabc1302e7a48740404f5e8d3fdb251ecc97de93c4a5d3e20cb
java-1.8.0-openjdk-demo-1.8.0.362.b08-1.el8_6.s390x.rpm
SHA-256: 9b09d18f143209b201f89603103ad37bde2b8adbd94fa5c9b5de4956cffd6398
java-1.8.0-openjdk-demo-debuginfo-1.8.0.362.b08-1.el8_6.s390x.rpm
SHA-256: 7d512a1043e0b5ea3f9add6547060a31e568424fa9001033c400bb1af8a96b10
java-1.8.0-openjdk-devel-1.8.0.362.b08-1.el8_6.s390x.rpm
SHA-256: 9536eef76976d27b4e19b3d05ebc7edb8addef9a5fb7df2aec683fd7b0548072
java-1.8.0-openjdk-devel-debuginfo-1.8.0.362.b08-1.el8_6.s390x.rpm
SHA-256: 59d0fdfb75de968653a8247613a24a308e1b75cb499a6f13cf49f0ccc2c428c8
java-1.8.0-openjdk-headless-1.8.0.362.b08-1.el8_6.s390x.rpm
SHA-256: 3b5eb2342d40ce02b7b6b9bd4b671be96d4fa309603bf285549e7f939bb057f8
java-1.8.0-openjdk-headless-debuginfo-1.8.0.362.b08-1.el8_6.s390x.rpm
SHA-256: 9f5baf1f3b5c92fdfba7c4ccace2f5d3db2073b5e451b9ae6015c9da3fbcf36c
java-1.8.0-openjdk-javadoc-1.8.0.362.b08-1.el8_6.noarch.rpm
SHA-256: b56a8808fba5dae958a9a030d330f0325e1e2da62cf8b82848dd2f51188edf33
java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b08-1.el8_6.noarch.rpm
SHA-256: e839fa227e70e52166f377c01cd9bf07d6317785b4f24a33bd3479210deb1dc0
java-1.8.0-openjdk-src-1.8.0.362.b08-1.el8_6.s390x.rpm
SHA-256: 5fcc917ff99f90fadcbc00f8bc5c765c6df28738c9e99d90819f31a109856251
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6
SRPM
java-1.8.0-openjdk-1.8.0.362.b08-1.el8_6.src.rpm
SHA-256: 6edf3b8756615d79d782c9b3a0e7686a48560f221d446e80f5e41a3a64e04229
ppc64le
java-1.8.0-openjdk-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 0ab65adb7641d727280578bd31d4ae44a0635fbf5e872c31f89089371bd4ded2
java-1.8.0-openjdk-accessibility-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 193989cb2ca1ab49529cd745edecc0b75f5a52e1651c071e29044c8a303610a8
java-1.8.0-openjdk-debuginfo-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: cad820943232d89c7111f99adf6d4b2991e6724948639442cba6bcc3fdc1ba72
java-1.8.0-openjdk-debugsource-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: cabe3486aca0df1bb40db7e174d387983c20be2eba177ec6d9b25f57a2246f09
java-1.8.0-openjdk-demo-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 8cea1be2b01c932c5c3295e99930939d2bc201f54062436c1357aca001c7df8c
java-1.8.0-openjdk-demo-debuginfo-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 7b04bf0536b73ee058a8c969174e7215ffb511d2ae4c180f40849b44ad30fc00
java-1.8.0-openjdk-devel-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: d35988cd57b447b4d69db09f73853ec365f03a9638530f165bf0ee3a771ec638
java-1.8.0-openjdk-devel-debuginfo-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 6ceef54d5a1fb11431b910de223511222d1aa6aa1840ddd52f3a3dbfb5aeea7a
java-1.8.0-openjdk-headless-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: a04fca75143056b7faafb9b508739c130a526218a792bf2a7125ce2a1e6b1c52
java-1.8.0-openjdk-headless-debuginfo-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 8ed7054546a282446f4f036c027fce7a3c450c8061fb9f21492c8c6e985f8056
java-1.8.0-openjdk-javadoc-1.8.0.362.b08-1.el8_6.noarch.rpm
SHA-256: b56a8808fba5dae958a9a030d330f0325e1e2da62cf8b82848dd2f51188edf33
java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b08-1.el8_6.noarch.rpm
SHA-256: e839fa227e70e52166f377c01cd9bf07d6317785b4f24a33bd3479210deb1dc0
java-1.8.0-openjdk-src-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 7dae78685e678615668a4d852d4db8befbb21efc22f57a7679fbac6ea33842f5
Red Hat Enterprise Linux Server - TUS 8.6
SRPM
java-1.8.0-openjdk-1.8.0.362.b08-1.el8_6.src.rpm
SHA-256: 6edf3b8756615d79d782c9b3a0e7686a48560f221d446e80f5e41a3a64e04229
x86_64
java-1.8.0-openjdk-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 63b5d72a1cff9abc71905a86d7fccd74c1fbda288f5e77ee37d8bc54aecd7c8f
java-1.8.0-openjdk-accessibility-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: f8736ff0c9a9b691346568a8d56e22d234dc5ee5daaff4f74ea5f5259ef72154
java-1.8.0-openjdk-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 3335a79103a252bd69cab8a9727294dd160c80b15622ac11037ccf0f009f24b8
java-1.8.0-openjdk-debugsource-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 0a7fc603701e8a9793588d94a5c1086f2ff1c6ec042533bbb32877163678560a
java-1.8.0-openjdk-demo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 124bfb9c6cb14e64d7c5de69e80a8063c07df7a1dc14b97eacb8346bb2488494
java-1.8.0-openjdk-demo-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 35db08a6cb120ca2e7131666c70110d698ddfc4b60aebe84368644f70edcb704
java-1.8.0-openjdk-devel-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 694f41632aff8b6a84c6919cfd68240db6e62291cc30c8fb48ee23ec12451a35
java-1.8.0-openjdk-devel-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 5499dffb3f48f619dc37356acd5aa29c4b292f79565795267fff99bf94421bde
java-1.8.0-openjdk-headless-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: e31f68ca03a83257550193612a1b83d21f439cbcb79d33d10b0cb2a23491bc60
java-1.8.0-openjdk-headless-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 85d345c82d9cd4cd5896fe99e52fa2f3f3b8a8944f6ef511bf41c3d09b80ce25
java-1.8.0-openjdk-javadoc-1.8.0.362.b08-1.el8_6.noarch.rpm
SHA-256: b56a8808fba5dae958a9a030d330f0325e1e2da62cf8b82848dd2f51188edf33
java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b08-1.el8_6.noarch.rpm
SHA-256: e839fa227e70e52166f377c01cd9bf07d6317785b4f24a33bd3479210deb1dc0
java-1.8.0-openjdk-src-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 3cc1148766fcc7f111c66f4a5f60135030a79699286d08ac13ab497e954c77d1
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6
SRPM
java-1.8.0-openjdk-1.8.0.362.b08-1.el8_6.src.rpm
SHA-256: 6edf3b8756615d79d782c9b3a0e7686a48560f221d446e80f5e41a3a64e04229
aarch64
java-1.8.0-openjdk-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: eb6ab5b1bbefe035c6f72b88b14f10e60a2a9ec623f371479127ccb4e30e77cb
java-1.8.0-openjdk-accessibility-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: 0a04e2448ae4148830f2b0cbeba07e6b8b4e8c5c2e8128e56fcaf21786b58742
java-1.8.0-openjdk-debuginfo-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: 05351489f2ecf09c92ac18f9cb8a6cbbb700613a123a1437ae28ff2fa295f438
java-1.8.0-openjdk-debugsource-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: b731bf1deb0290ac7f41244c3b45cba6a188e2fdef7de530cacbe5efb8e27564
java-1.8.0-openjdk-demo-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: ed90c067eaf3c78d9b061a68af6f5cbaea97010148d27bf00cefb04514f6a2ef
java-1.8.0-openjdk-demo-debuginfo-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: e7df0b4dc6a41f446884892491a2163b74f1d3e43fed207db7eed05751aca3ea
java-1.8.0-openjdk-devel-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: 89c3f9619b1843cec161e859238f72549dc662534bca022a13dfab6f5c4057dd
java-1.8.0-openjdk-devel-debuginfo-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: 6a11b8c45ab4af9dfd4db12c2de57d052273ba89dcac98684a14d097aca86fd1
java-1.8.0-openjdk-headless-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: aaf9086dd08c3fbf2267434c2d990d0e1a72652313d709ce50ebdc145554af1d
java-1.8.0-openjdk-headless-debuginfo-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: a367c528fac391d13523da433a5ab111ce3ec2044f6634d16b19e0be4a72bc30
java-1.8.0-openjdk-javadoc-1.8.0.362.b08-1.el8_6.noarch.rpm
SHA-256: b56a8808fba5dae958a9a030d330f0325e1e2da62cf8b82848dd2f51188edf33
java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b08-1.el8_6.noarch.rpm
SHA-256: e839fa227e70e52166f377c01cd9bf07d6317785b4f24a33bd3479210deb1dc0
java-1.8.0-openjdk-src-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: 68bd0b9ca54a509452cbd2f896de0a46c3ce3a789d81bdac1a7e63ecdf35b9c0
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6
SRPM
java-1.8.0-openjdk-1.8.0.362.b08-1.el8_6.src.rpm
SHA-256: 6edf3b8756615d79d782c9b3a0e7686a48560f221d446e80f5e41a3a64e04229
ppc64le
java-1.8.0-openjdk-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 0ab65adb7641d727280578bd31d4ae44a0635fbf5e872c31f89089371bd4ded2
java-1.8.0-openjdk-accessibility-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 193989cb2ca1ab49529cd745edecc0b75f5a52e1651c071e29044c8a303610a8
java-1.8.0-openjdk-debuginfo-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: cad820943232d89c7111f99adf6d4b2991e6724948639442cba6bcc3fdc1ba72
java-1.8.0-openjdk-debugsource-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: cabe3486aca0df1bb40db7e174d387983c20be2eba177ec6d9b25f57a2246f09
java-1.8.0-openjdk-demo-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 8cea1be2b01c932c5c3295e99930939d2bc201f54062436c1357aca001c7df8c
java-1.8.0-openjdk-demo-debuginfo-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 7b04bf0536b73ee058a8c969174e7215ffb511d2ae4c180f40849b44ad30fc00
java-1.8.0-openjdk-devel-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: d35988cd57b447b4d69db09f73853ec365f03a9638530f165bf0ee3a771ec638
java-1.8.0-openjdk-devel-debuginfo-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 6ceef54d5a1fb11431b910de223511222d1aa6aa1840ddd52f3a3dbfb5aeea7a
java-1.8.0-openjdk-headless-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: a04fca75143056b7faafb9b508739c130a526218a792bf2a7125ce2a1e6b1c52
java-1.8.0-openjdk-headless-debuginfo-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 8ed7054546a282446f4f036c027fce7a3c450c8061fb9f21492c8c6e985f8056
java-1.8.0-openjdk-javadoc-1.8.0.362.b08-1.el8_6.noarch.rpm
SHA-256: b56a8808fba5dae958a9a030d330f0325e1e2da62cf8b82848dd2f51188edf33
java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b08-1.el8_6.noarch.rpm
SHA-256: e839fa227e70e52166f377c01cd9bf07d6317785b4f24a33bd3479210deb1dc0
java-1.8.0-openjdk-src-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 7dae78685e678615668a4d852d4db8befbb21efc22f57a7679fbac6ea33842f5
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6
SRPM
java-1.8.0-openjdk-1.8.0.362.b08-1.el8_6.src.rpm
SHA-256: 6edf3b8756615d79d782c9b3a0e7686a48560f221d446e80f5e41a3a64e04229
x86_64
java-1.8.0-openjdk-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 63b5d72a1cff9abc71905a86d7fccd74c1fbda288f5e77ee37d8bc54aecd7c8f
java-1.8.0-openjdk-accessibility-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: f8736ff0c9a9b691346568a8d56e22d234dc5ee5daaff4f74ea5f5259ef72154
java-1.8.0-openjdk-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 3335a79103a252bd69cab8a9727294dd160c80b15622ac11037ccf0f009f24b8
java-1.8.0-openjdk-debugsource-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 0a7fc603701e8a9793588d94a5c1086f2ff1c6ec042533bbb32877163678560a
java-1.8.0-openjdk-demo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 124bfb9c6cb14e64d7c5de69e80a8063c07df7a1dc14b97eacb8346bb2488494
java-1.8.0-openjdk-demo-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 35db08a6cb120ca2e7131666c70110d698ddfc4b60aebe84368644f70edcb704
java-1.8.0-openjdk-devel-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 694f41632aff8b6a84c6919cfd68240db6e62291cc30c8fb48ee23ec12451a35
java-1.8.0-openjdk-devel-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 5499dffb3f48f619dc37356acd5aa29c4b292f79565795267fff99bf94421bde
java-1.8.0-openjdk-headless-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: e31f68ca03a83257550193612a1b83d21f439cbcb79d33d10b0cb2a23491bc60
java-1.8.0-openjdk-headless-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 85d345c82d9cd4cd5896fe99e52fa2f3f3b8a8944f6ef511bf41c3d09b80ce25
java-1.8.0-openjdk-javadoc-1.8.0.362.b08-1.el8_6.noarch.rpm
SHA-256: b56a8808fba5dae958a9a030d330f0325e1e2da62cf8b82848dd2f51188edf33
java-1.8.0-openjdk-javadoc-zip-1.8.0.362.b08-1.el8_6.noarch.rpm
SHA-256: e839fa227e70e52166f377c01cd9bf07d6317785b4f24a33bd3479210deb1dc0
java-1.8.0-openjdk-src-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 3cc1148766fcc7f111c66f4a5f60135030a79699286d08ac13ab497e954c77d1
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6
SRPM
x86_64
java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: f2dae04aa67886657db2ba3ebee440790e32ca08b14f77b9bb35c312f48892b1
java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 5343b13646449fbfd6ac9aab551ec5ce44a2d26dc369bb910f4938597c666be9
java-1.8.0-openjdk-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 3335a79103a252bd69cab8a9727294dd160c80b15622ac11037ccf0f009f24b8
java-1.8.0-openjdk-debugsource-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 0a7fc603701e8a9793588d94a5c1086f2ff1c6ec042533bbb32877163678560a
java-1.8.0-openjdk-demo-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 35db08a6cb120ca2e7131666c70110d698ddfc4b60aebe84368644f70edcb704
java-1.8.0-openjdk-demo-fastdebug-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: fff38fefbefc84bcf69b4a1015956feabd3773f50f0071eb1d9dc63d63ab5101
java-1.8.0-openjdk-demo-fastdebug-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: b70ac33b815437b61f1bccb15a49d98fe364bd866ed867faacddfdbe34a6e656
java-1.8.0-openjdk-demo-slowdebug-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 05a80aa02fbddfe726a00bfad54d3d4ce3e217af90d7128b570cbd24754005fb
java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: b2175a2c9d702632ae0feef980e2b0175759e7f2260151791c38358935ab9165
java-1.8.0-openjdk-devel-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 5499dffb3f48f619dc37356acd5aa29c4b292f79565795267fff99bf94421bde
java-1.8.0-openjdk-devel-fastdebug-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 0f77ab6ff5f5e201ed100a3a21491a75c3448b1957c8a8e4fa189ed7e529d8bf
java-1.8.0-openjdk-devel-fastdebug-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: b5a15fd9068d8613a0bc9ec04986fd88e004246d7fc51cc25a501a1e6b173f77
java-1.8.0-openjdk-devel-slowdebug-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 1bc48bec2e1c17e2ad8603355f766b9eb5a1a6bf3c442620a40344e6ccf86cb0
java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: cd1db10f5ec3287c9d3e1ac7826807d1f4cf18a5d2fa4492e84d0bc5e085019c
java-1.8.0-openjdk-fastdebug-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: dd230583d0d333322c6a8f5fb76ecedae630004f360d8c32394feff916c0cb89
java-1.8.0-openjdk-fastdebug-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: bbc63bae1de9bc813833389aa631d5ad9cce0707c89eb834f95d885dd435397d
java-1.8.0-openjdk-headless-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 85d345c82d9cd4cd5896fe99e52fa2f3f3b8a8944f6ef511bf41c3d09b80ce25
java-1.8.0-openjdk-headless-fastdebug-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: fb503092b5f18b8d5d065229594062d917b7dd260682600565ca7fc4900ac141
java-1.8.0-openjdk-headless-fastdebug-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: b66fa07b9adc472fcc166b0b984abb4ae3e82b63f85f698efe86b62f95e1fcb9
java-1.8.0-openjdk-headless-slowdebug-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 7b2bbe6f264998dd32a168fb41879f6a617e536b77dd709fcfb76d4b55937e8a
java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 0a9b065a63a6fe99ac443768b1be6e182ac9947b86f12b5e920a62aee75625df
java-1.8.0-openjdk-slowdebug-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: f2318945800a3f2105ca8d7deb2698f6dc973b2337dc38ea6521536289870491
java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 233a4e423d93d3ecd46251fbc21ba7bad56d4de6f15ca50ec59b594e1c869886
java-1.8.0-openjdk-src-fastdebug-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: a0d90d0b22776c818d2981b52f96891d33746c3ccbe13664a1bdffe7cbdc33d4
java-1.8.0-openjdk-src-slowdebug-1.8.0.362.b08-1.el8_6.x86_64.rpm
SHA-256: 5fc99f52806cb923dc40fa537acaf829d6d220de2b3d74fe8ce9af66028ac9e6
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6
SRPM
ppc64le
java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 522316bd6f6f5f6706a56caa4bf919786b49f4594509d34953496e20ec1c5b1c
java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: a37df04384d204e7c73eb1b94d3b652fd9cc72701d6bbefe7cb60935c92abfd4
java-1.8.0-openjdk-debuginfo-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: cad820943232d89c7111f99adf6d4b2991e6724948639442cba6bcc3fdc1ba72
java-1.8.0-openjdk-debugsource-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: cabe3486aca0df1bb40db7e174d387983c20be2eba177ec6d9b25f57a2246f09
java-1.8.0-openjdk-demo-debuginfo-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 7b04bf0536b73ee058a8c969174e7215ffb511d2ae4c180f40849b44ad30fc00
java-1.8.0-openjdk-demo-fastdebug-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 10a21a6e0f19d50f03b3e1250f566e3d2a6042c248b735cb25067fb8356809c2
java-1.8.0-openjdk-demo-fastdebug-debuginfo-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 6c067a544e0927d3697a42bd86ccbbc15f550433de7bb2017a35ce08793fda68
java-1.8.0-openjdk-demo-slowdebug-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 5c0931f3eaf84e3ed2c2209614d1aa83d994f99108200e746c6fb2d43da76c00
java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 86725b55cec662d220efb227e1a6b303f5f1c3ba744216f153fa9551a2e5ff35
java-1.8.0-openjdk-devel-debuginfo-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 6ceef54d5a1fb11431b910de223511222d1aa6aa1840ddd52f3a3dbfb5aeea7a
java-1.8.0-openjdk-devel-fastdebug-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: e880acaf94a5e036365698c4f69b0827be60a7c0c3777c74aa262c2342bffe85
java-1.8.0-openjdk-devel-fastdebug-debuginfo-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: e920fe59cb92a4271aaa77e4b0656e629fa9a3a792026d81852fb899de0ef883
java-1.8.0-openjdk-devel-slowdebug-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 7ccf979b481891c9c8be0a1e0c799aaff12d1f9585cd56d259c5380fa5750b81
java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 8f779ddfa099937db2079fe364c9899fe0bf3876e737d674d1165867ec666628
java-1.8.0-openjdk-fastdebug-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 361c937c87d99484377ed07da09cf3b0162f4cacde318e80edd77bf794869de3
java-1.8.0-openjdk-fastdebug-debuginfo-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 380b0e411605ad70cd558c412be8ee05d447f0ba971ce34299edf9a4f7b3df1d
java-1.8.0-openjdk-headless-debuginfo-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 8ed7054546a282446f4f036c027fce7a3c450c8061fb9f21492c8c6e985f8056
java-1.8.0-openjdk-headless-fastdebug-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 91ce5c20b20be5066c2f16ad4575dcebadfdd536976144904b9cfe4ae231c7f9
java-1.8.0-openjdk-headless-fastdebug-debuginfo-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 3f0766c327ff67720cf26b2f1ef4053fcbab54b317ef582edf46aa0de348f715
java-1.8.0-openjdk-headless-slowdebug-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 0a629f35262f8e12ae74bf5f72c4429b15b84b3d2426e7155b554b96bb68eb35
java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 1b5e7adb1c9c69b022fef4c9132b13d66617181888a5b126b716abec6d646c00
java-1.8.0-openjdk-slowdebug-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 82f3d2e05a5e252bd74a9e16a8d21be6175c6ac843b29d253131ab4afd4594dc
java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 659d9e70c6ac0786b6b43349944951f9fa1aab91af42f37c6dbd2f29a227291d
java-1.8.0-openjdk-src-fastdebug-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 5efc7a6d520b28121517a2ededb912495cbca9587c95922d0313b641e0b280a0
java-1.8.0-openjdk-src-slowdebug-1.8.0.362.b08-1.el8_6.ppc64le.rpm
SHA-256: 0a4d928339037a87732f47f8de871473b747acd25d90959130fb8380851160eb
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6
SRPM
aarch64
java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: c8f829eb05226921d9617bf9b62b8385d3590291153ab23ed760a417dedca4c2
java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: 28cbcf0d3911f13d8a5f6f2bf8733843690894213463da7458b48da993a28205
java-1.8.0-openjdk-debuginfo-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: 05351489f2ecf09c92ac18f9cb8a6cbbb700613a123a1437ae28ff2fa295f438
java-1.8.0-openjdk-debugsource-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: b731bf1deb0290ac7f41244c3b45cba6a188e2fdef7de530cacbe5efb8e27564
java-1.8.0-openjdk-demo-debuginfo-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: e7df0b4dc6a41f446884892491a2163b74f1d3e43fed207db7eed05751aca3ea
java-1.8.0-openjdk-demo-fastdebug-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: 07bb55bb9fecce1a148bca7f509cc0eae3c8aef49b35014e513c5ea36d9ae17c
java-1.8.0-openjdk-demo-fastdebug-debuginfo-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: 978b7da230a2a99b964b75c7e33760b3fa2cfbac2839f476a22756e955f42b06
java-1.8.0-openjdk-demo-slowdebug-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: 5d97a0cbcea9085673b3b52632020a848cb722f85b37eed492e9a225226158ac
java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: 58410c3e86c947f3cee666629255de913714ce828023618c9f6b5a003c85b195
java-1.8.0-openjdk-devel-debuginfo-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: 6a11b8c45ab4af9dfd4db12c2de57d052273ba89dcac98684a14d097aca86fd1
java-1.8.0-openjdk-devel-fastdebug-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: b0f96b36c3c80e8b040a691706839dcfedb1e1eafae7619598ddd654f5539cd0
java-1.8.0-openjdk-devel-fastdebug-debuginfo-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: 93c97a9dbe35750362160d4ee992196e15e6186c9a98ad6c53d3ee3bb6a82f27
java-1.8.0-openjdk-devel-slowdebug-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: 48da59ff6d3d459856b8f336866ad2b879a230a04ead09f2896b44a0d6ac6c00
java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: 7906683ccb125b4ea53005239bbd08b64fc8cfffd562a42fdefe9901474b4441
java-1.8.0-openjdk-fastdebug-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: f84cd21d2d0d5f2ab9c2170076be2ae9e20ba73a56a612f8e75c2155f15f8c1d
java-1.8.0-openjdk-fastdebug-debuginfo-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: f55e4138ecc8542dc1861daf85ac8414322bf3a0e0a18316498c6424a01b7c88
java-1.8.0-openjdk-headless-debuginfo-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: a367c528fac391d13523da433a5ab111ce3ec2044f6634d16b19e0be4a72bc30
java-1.8.0-openjdk-headless-fastdebug-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: 989c31554af57c9aac222fcbeb282ab1380c070ccd64bf32bb1562c07d3c3c9b
java-1.8.0-openjdk-headless-fastdebug-debuginfo-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: bef80bfde78975cbe3024dc9df16784d8d6cc5b406db14f9ac561866b5500a4b
java-1.8.0-openjdk-headless-slowdebug-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: 014e856e7d04ee578d50dec372db50290f8db5298ecda834c6cfc16a216b8b80
java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: 2d4b16a58cc5aab1659a8aef7c74455a637348f5ae81deca0430865d9da3660d
java-1.8.0-openjdk-slowdebug-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: 2685fa8a4d608fa4b04494da0489fe0189fb1d6e8ba567638aea72892985b64a
java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: daaf2d9eb9254bd78d950f394e2baa0e14d5feb52220e3c4f4c407dc4e8274eb
java-1.8.0-openjdk-src-fastdebug-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: 8e540964bcfa0825510d20775e5c2f7da4520df4557f028b512c0608471a621f
java-1.8.0-openjdk-src-slowdebug-1.8.0.362.b08-1.el8_6.aarch64.rpm
SHA-256: 57612b0475340f79cdd4721e427b6cea338b20b60a1f7870ec8df492deb63a48
Related news
Gentoo Linux Security Advisory 202409-26 - Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution. Versions less than or equal to 3.21.0 are affected.
IBM QRadar SIEM 7.5.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 254138
IBM Security Guardium 11.4 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 240905.
Progress Chef Infra Server before 15.7 allows a local attacker to exploit a /var/opt/opscode/local-mode-cache/backup world-readable temporary backup path to access sensitive information, resulting in the disclosure of all indexed node data, because OpenSearch credentials are exposed. (The data typically includes credentials for additional systems.) The attacker must wait for an admin to run the "chef-server-ctl reconfigure" command.
Red Hat Security Advisory 2023-3136-01 - IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR8. Issues addressed include a deserialization vulnerability.
Red Hat Security Advisory 2023-1286-01 - Migration Toolkit for Runtimes 1.0.2 Images. Issues addressed include denial of service, privilege escalation, and server-side request forgery vulnerabilities.
Red Hat Security Advisory 2023-1047-01 - A new image is available for Red Hat Single Sign-On 7.6.2, running on Red Hat OpenShift Container Platform from the release of 3.11 up to the release of 4.12.0. Issues addressed include code execution, cross site scripting, denial of service, deserialization, html injection, memory exhaustion, server-side request forgery, and traversal vulnerabilities.
An update is now available for the Logging subsystem for Red Hat OpenShift 5.4. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-30123: A flaw was found in ruby gem-rack. This flaw allows a malicious actor to craft requests that can cause shell escape sequences to be written to the terminal via rack's `Lint` middleware and `CommonLogger` middleware. This issue can leverage these escape sequences to execute commands in the victim's terminal. * CVE-2022-41717: A flaw was f...
Red Hat Security Advisory 2023-0208-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Issues addressed include a deserialization vulnerability.
Red Hat Security Advisory 2023-0210-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Issues addressed include a deserialization vulnerability.
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-21830: OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) * CVE-2023-21843: OpenJDK: soundbank URL remote loading (Sound, 8293742)
Red Hat Security Advisory 2023-0203-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Issues addressed include a deserialization vulnerability.
Red Hat Security Advisory 2023-0387-01 - The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. This release of the Red Hat build of OpenJDK 8 for portable Linux serves as a replacement for Red Hat build of OpenJDK 8 and includes security and bug fixes as well as enhancements. For further information, refer to the release notes linked to in the References section. Issues addressed include a deserialization vulnerability.
Red Hat Security Advisory 2023-0354-01 - The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. This release of the Red Hat build of OpenJDK 8 for Windows serves as a replacement for the Red Hat build of OpenJDK 8 and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section. Issues addressed include a deserialization vulnerability.
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-21830: OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) * CVE-2023-21843: OpenJDK: soundbank URL remote loading (Sound, 8293742)
The Red Hat Build of OpenJDK 11 (java-11-openjdk) is now available for Windows. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-21835: OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) * CVE-2023-21843: OpenJDK: soundbank URL remote loading (Sound, 8293742)
The Red Hat Build of OpenJDK 11 (java-11-openjdk) is now available for portable Linux. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-21835: OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) * CVE-2023-21843: OpenJDK: soundbank URL remote loading (Sound, 8293742)
The Red Hat build of OpenJDK 8 (java-1.8.0-openjdk) is now available for portable Linux. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-21830: OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) * CVE-2023-21843: OpenJDK: soundbank URL remote loading (Sound, 8293742)
The Red Hat build of OpenJDK 8 (java-1.8.0-openjdk) is now available for Windows. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-21830: OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) * CVE-2023-21843: OpenJDK: soundbank URL remote loading (Sound, 8293742)
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-21830: OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) * CVE-2023-21843: OpenJDK: soundbank URL remote loading (Sound, 8293742)
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-21830: OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) * CVE-2023-21843: OpenJDK: soundbank URL remote loading (Sound, 8293742)
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-21830: OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) * CVE-2023-21843: OpenJDK: soundbank URL remote loading (Sound, 8293742)
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-21830: OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021) * CVE-2023-21843: OpenJDK: soundbank URL remote loading (Sound, 8293742)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-21835: OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) * CVE-2023-21843: OpenJDK: soundbank URL remote loading (Sound, 8293742)
Red Hat Security Advisory 2023-0202-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-0198-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-0190-01 - The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-0196-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include a denial of service vulnerability.
Red Hat Security Advisory 2023-0200-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include a denial of service vulnerability.
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-21835: OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) * CVE-2023-21843: OpenJDK: soundbank URL remote loading (Sound, 8293742)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-21835: OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) * CVE-2023-21843: OpenJDK: soundbank URL remote loading (Sound, 8293742)
An update for java-17-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-21835: OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) * CVE-2023-21843: OpenJDK: soundbank URL remote loading (Sound, 8293742)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-21835: OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) * CVE-2023-21843: OpenJDK: soundbank URL remote loading (Sound, 8293742)
An update for java-17-openjdk is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2023-21835: OpenJDK: handshake DoS attack against DTLS connections (JSSE, 8287411) * CVE-2023-21843: OpenJDK: soundbank URL remote loading (Sound, 8293742)
Vulnerability in the Oracle Demantra Demand Management product of Oracle Supply Chain (component: E-Business Collections). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Demantra Demand Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Demantra Demand Management accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).