Headline
RHSA-2022:5683: Red Hat Security Advisory: java-11-openjdk security, bug fix, and enhancement update
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859)
- CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)
- CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
Synopsis
Important: java-11-openjdk security, bug fix, and enhancement update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
The following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.16.0.8). (BZ#2084649)
Security Fix(es):
- OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)
- OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
- OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-8, openjdk-11] (BZ#2099917)
- Revert to disabling system security properties and FIPS mode support together [rhel-8, openjdk-11] (BZ#2108248)
- SecretKey generate/import operations don’t add the CKA_SIGN attribute in FIPS mode [rhel-8, openjdk-11] (BZ#2108251)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
All running instances of OpenJDK Java must be restarted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 8 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat Enterprise Linux for Power, little endian 8 ppc64le
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux for ARM 64 8 aarch64
- Red Hat CodeReady Linux Builder for x86_64 8 x86_64
- Red Hat CodeReady Linux Builder for ARM 64 8 aarch64
- Red Hat CodeReady Linux Builder for IBM z Systems 8 s390x
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian 8 ppc64le
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6 aarch64
Fixes
- BZ - 2084649 - Prepare for the next quarterly OpenJDK upstream release (2022-07, 11.0.16) [rhel-8] [rhel-8.6.0.z]
- BZ - 2099917 - rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-8, openjdk-11] [rhel-8.6.0.z]
- BZ - 2108248 - Revert to disabling system security properties and FIPS mode support together [rhel-8, openjdk-11] [rhel-8.6.0.z]
- BZ - 2108251 - SecretKey generate/import operations don’t add the CKA_SIGN attribute in FIPS mode [rhel-8, openjdk-11] [rhel-8.6.0.z]
- BZ - 2108540 - CVE-2022-21540 OpenJDK: class compilation issue (Hotspot, 8281859)
- BZ - 2108543 - CVE-2022-21541 OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)
- BZ - 2108554 - CVE-2022-34169 OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
Red Hat Enterprise Linux for x86_64 8
SRPM
java-11-openjdk-11.0.16.0.8-1.el8_6.src.rpm
SHA-256: 3a66a4d12a7f5a313221d63d0e090c51ed070ef1ec5fbed07b09903731979721
x86_64
java-11-openjdk-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 9c8bc9f6c93ba8aa8fc94db8ab0d0d117cdc434b4f4a02c6035628d7f76fda48
java-11-openjdk-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: b800a6a17c623c860843e87caad4ae16a84d20c063c7afdcda62e3cd200e2055
java-11-openjdk-debugsource-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: e340eeb505828f358f0d54a3a732ceec9331e163a17b67d75267d6a42e73e638
java-11-openjdk-demo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: d42fac8e23179680e8e50df882bd3fb5b1182191ad6a90a6d5dd29f38d2b37a2
java-11-openjdk-devel-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 003805f64f012aa6559886a49128db085f3403047a4f598874d48d40fe7e701e
java-11-openjdk-devel-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: f0cf0973dfbc320281c5e6ceaf900e8014af5c9e984dd2f7c988bb65623fd9df
java-11-openjdk-headless-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: ad7518522428253d50d4b6ef72ea0ddc7d7458a61ecfe9378a40e40685c367cb
java-11-openjdk-headless-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: b626f391216745b150e3ff021878bc5c53c222a1b5b55414e9aac125a97b5ea4
java-11-openjdk-javadoc-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: e1665f690896ececc1f1f60e8174df71b157a3bd06f27f0583edc964ca3dcd2b
java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 9bed2ba7c297fd34d7e09154cdad71feaefa60a2532a35b8eb5e6a3ee421231e
java-11-openjdk-jmods-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: e725b2f7a4c9e44391f6a8c643ecbbd13779b121128e18053ae9ed2567c58c49
java-11-openjdk-src-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: db2d642fe4b2a91e99b1f53c72b81bed5e4f46ed438c1af2da5d088d440082af
java-11-openjdk-static-libs-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: fc22f61bae0a0ff8a671bb00f8fbbed248aa6daacf27b71679775ac4fd581c5f
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM
java-11-openjdk-11.0.16.0.8-1.el8_6.src.rpm
SHA-256: 3a66a4d12a7f5a313221d63d0e090c51ed070ef1ec5fbed07b09903731979721
x86_64
java-11-openjdk-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 9c8bc9f6c93ba8aa8fc94db8ab0d0d117cdc434b4f4a02c6035628d7f76fda48
java-11-openjdk-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: b800a6a17c623c860843e87caad4ae16a84d20c063c7afdcda62e3cd200e2055
java-11-openjdk-debugsource-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: e340eeb505828f358f0d54a3a732ceec9331e163a17b67d75267d6a42e73e638
java-11-openjdk-demo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: d42fac8e23179680e8e50df882bd3fb5b1182191ad6a90a6d5dd29f38d2b37a2
java-11-openjdk-devel-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 003805f64f012aa6559886a49128db085f3403047a4f598874d48d40fe7e701e
java-11-openjdk-devel-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: f0cf0973dfbc320281c5e6ceaf900e8014af5c9e984dd2f7c988bb65623fd9df
java-11-openjdk-headless-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: ad7518522428253d50d4b6ef72ea0ddc7d7458a61ecfe9378a40e40685c367cb
java-11-openjdk-headless-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: b626f391216745b150e3ff021878bc5c53c222a1b5b55414e9aac125a97b5ea4
java-11-openjdk-javadoc-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: e1665f690896ececc1f1f60e8174df71b157a3bd06f27f0583edc964ca3dcd2b
java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 9bed2ba7c297fd34d7e09154cdad71feaefa60a2532a35b8eb5e6a3ee421231e
java-11-openjdk-jmods-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: e725b2f7a4c9e44391f6a8c643ecbbd13779b121128e18053ae9ed2567c58c49
java-11-openjdk-src-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: db2d642fe4b2a91e99b1f53c72b81bed5e4f46ed438c1af2da5d088d440082af
java-11-openjdk-static-libs-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: fc22f61bae0a0ff8a671bb00f8fbbed248aa6daacf27b71679775ac4fd581c5f
Red Hat Enterprise Linux Server - AUS 8.6
SRPM
java-11-openjdk-11.0.16.0.8-1.el8_6.src.rpm
SHA-256: 3a66a4d12a7f5a313221d63d0e090c51ed070ef1ec5fbed07b09903731979721
x86_64
java-11-openjdk-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 9c8bc9f6c93ba8aa8fc94db8ab0d0d117cdc434b4f4a02c6035628d7f76fda48
java-11-openjdk-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: b800a6a17c623c860843e87caad4ae16a84d20c063c7afdcda62e3cd200e2055
java-11-openjdk-debugsource-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: e340eeb505828f358f0d54a3a732ceec9331e163a17b67d75267d6a42e73e638
java-11-openjdk-demo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: d42fac8e23179680e8e50df882bd3fb5b1182191ad6a90a6d5dd29f38d2b37a2
java-11-openjdk-devel-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 003805f64f012aa6559886a49128db085f3403047a4f598874d48d40fe7e701e
java-11-openjdk-devel-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: f0cf0973dfbc320281c5e6ceaf900e8014af5c9e984dd2f7c988bb65623fd9df
java-11-openjdk-headless-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: ad7518522428253d50d4b6ef72ea0ddc7d7458a61ecfe9378a40e40685c367cb
java-11-openjdk-headless-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: b626f391216745b150e3ff021878bc5c53c222a1b5b55414e9aac125a97b5ea4
java-11-openjdk-javadoc-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: e1665f690896ececc1f1f60e8174df71b157a3bd06f27f0583edc964ca3dcd2b
java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 9bed2ba7c297fd34d7e09154cdad71feaefa60a2532a35b8eb5e6a3ee421231e
java-11-openjdk-jmods-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: e725b2f7a4c9e44391f6a8c643ecbbd13779b121128e18053ae9ed2567c58c49
java-11-openjdk-src-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: db2d642fe4b2a91e99b1f53c72b81bed5e4f46ed438c1af2da5d088d440082af
java-11-openjdk-static-libs-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: fc22f61bae0a0ff8a671bb00f8fbbed248aa6daacf27b71679775ac4fd581c5f
Red Hat Enterprise Linux for IBM z Systems 8
SRPM
java-11-openjdk-11.0.16.0.8-1.el8_6.src.rpm
SHA-256: 3a66a4d12a7f5a313221d63d0e090c51ed070ef1ec5fbed07b09903731979721
s390x
java-11-openjdk-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 823d8fed085820fc0e8afc384ffe017e0d12d0c1760429107229ef6bf26f70f0
java-11-openjdk-debuginfo-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 29363991f25257487597ecac93d9d6053a2723d1a4d483479af16949114c4aca
java-11-openjdk-debugsource-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 5537511156bb4e353e498101e3b0707830ecd4067e4caba604b1e2376b71a61e
java-11-openjdk-demo-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: b35a89d4c48110201b4d8572f1e9516e6c6a859cdb8553e592ffc77d93b3f91e
java-11-openjdk-devel-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 37277977793492e86b785a1ab5b9ade82c0002c7b9ecaf08ed42fed852edbbbf
java-11-openjdk-devel-debuginfo-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 07c4b58a216af713077c79ba844d0a80b113e1b38df53c4c422f99abcf7b604b
java-11-openjdk-headless-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 54dacab8029c3cf0089477f614b533518ccfaee32f7d1a85dc5814667e19d653
java-11-openjdk-headless-debuginfo-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 6127fdc79bc0442685016648862003bea34909f6d762810dd16e236ddcb2a8b7
java-11-openjdk-javadoc-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 26d3b6f132e34a985a83f7f48b975f915103ba9e5cfc33c0a886ae45d922023c
java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 9cf7eecbecac8193f19806c96fa3ce803c3eab6c706fe05601daaa51be44b2aa
java-11-openjdk-jmods-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 2c62312a294d86165d45e3d0f39ce8c3e772a542cf8cb3d5805b16ebc759a549
java-11-openjdk-src-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 5827cd39f97da411896a19e9d7df828133af513bfa3b9fe6d4f7c46e07a7c481
java-11-openjdk-static-libs-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 0eed58e5151ab93150a9dcb5d1bf5865b43387dccfcdb3953277007fbd1f9af1
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6
SRPM
java-11-openjdk-11.0.16.0.8-1.el8_6.src.rpm
SHA-256: 3a66a4d12a7f5a313221d63d0e090c51ed070ef1ec5fbed07b09903731979721
s390x
java-11-openjdk-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 823d8fed085820fc0e8afc384ffe017e0d12d0c1760429107229ef6bf26f70f0
java-11-openjdk-debuginfo-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 29363991f25257487597ecac93d9d6053a2723d1a4d483479af16949114c4aca
java-11-openjdk-debugsource-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 5537511156bb4e353e498101e3b0707830ecd4067e4caba604b1e2376b71a61e
java-11-openjdk-demo-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: b35a89d4c48110201b4d8572f1e9516e6c6a859cdb8553e592ffc77d93b3f91e
java-11-openjdk-devel-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 37277977793492e86b785a1ab5b9ade82c0002c7b9ecaf08ed42fed852edbbbf
java-11-openjdk-devel-debuginfo-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 07c4b58a216af713077c79ba844d0a80b113e1b38df53c4c422f99abcf7b604b
java-11-openjdk-headless-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 54dacab8029c3cf0089477f614b533518ccfaee32f7d1a85dc5814667e19d653
java-11-openjdk-headless-debuginfo-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 6127fdc79bc0442685016648862003bea34909f6d762810dd16e236ddcb2a8b7
java-11-openjdk-javadoc-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 26d3b6f132e34a985a83f7f48b975f915103ba9e5cfc33c0a886ae45d922023c
java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 9cf7eecbecac8193f19806c96fa3ce803c3eab6c706fe05601daaa51be44b2aa
java-11-openjdk-jmods-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 2c62312a294d86165d45e3d0f39ce8c3e772a542cf8cb3d5805b16ebc759a549
java-11-openjdk-src-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 5827cd39f97da411896a19e9d7df828133af513bfa3b9fe6d4f7c46e07a7c481
java-11-openjdk-static-libs-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 0eed58e5151ab93150a9dcb5d1bf5865b43387dccfcdb3953277007fbd1f9af1
Red Hat Enterprise Linux for Power, little endian 8
SRPM
java-11-openjdk-11.0.16.0.8-1.el8_6.src.rpm
SHA-256: 3a66a4d12a7f5a313221d63d0e090c51ed070ef1ec5fbed07b09903731979721
ppc64le
java-11-openjdk-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 62a1291334a03742296456bbb805540509c3c693edcbf168cc28fc989f62150a
java-11-openjdk-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: c6ebd85ebca0779c43e756942d4c6c7724bb40608b8397eb123f9ce4bd5716a8
java-11-openjdk-debugsource-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 37f47bb3c2db76f599c66a18391540a63816a65ea4a10323afc72a79a515219e
java-11-openjdk-demo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 3731c3435e9c7a3626c75c7064af4d3a394798ed346c276c080a56f3d23f89d4
java-11-openjdk-devel-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 8a5b11a04c4a79010524c984b9d585c83c76a64c651b3d323e05f7de8374b1b7
java-11-openjdk-devel-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: f75155d45d616de0419bad6388a02d2505d4407fd0bbd6d5d564c727e0630191
java-11-openjdk-headless-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: e7151937ad4fb4a050892015eefd61ce3f057a2477b2fa1ec5b915cd7ab11afc
java-11-openjdk-headless-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: cbf14ffef111f57952b85d2818f3a60058bc243bcb6f66022f679203b627e5cc
java-11-openjdk-javadoc-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: f93656e7bf8bbc94d32cd29611b9fe1b92f540790819a277c9e059d9cad930c5
java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 62f7b276576829e13caff447dd23dbb0ab52f9415b296311a91b418a3699b6d1
java-11-openjdk-jmods-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: e794f1fe31c01e86c64418b105b0a20eaed732590a2daf83407ff68e662f06f8
java-11-openjdk-src-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 54bd0dd71d67b51e64b03fba52239819d0acbfa4c324640175dbd20e727b3655
java-11-openjdk-static-libs-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 6fa9376776c2d8fb9f69ffa24b50e84ae9b4f7476c10a65ae68f68f0d95f1d4a
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6
SRPM
java-11-openjdk-11.0.16.0.8-1.el8_6.src.rpm
SHA-256: 3a66a4d12a7f5a313221d63d0e090c51ed070ef1ec5fbed07b09903731979721
ppc64le
java-11-openjdk-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 62a1291334a03742296456bbb805540509c3c693edcbf168cc28fc989f62150a
java-11-openjdk-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: c6ebd85ebca0779c43e756942d4c6c7724bb40608b8397eb123f9ce4bd5716a8
java-11-openjdk-debugsource-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 37f47bb3c2db76f599c66a18391540a63816a65ea4a10323afc72a79a515219e
java-11-openjdk-demo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 3731c3435e9c7a3626c75c7064af4d3a394798ed346c276c080a56f3d23f89d4
java-11-openjdk-devel-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 8a5b11a04c4a79010524c984b9d585c83c76a64c651b3d323e05f7de8374b1b7
java-11-openjdk-devel-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: f75155d45d616de0419bad6388a02d2505d4407fd0bbd6d5d564c727e0630191
java-11-openjdk-headless-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: e7151937ad4fb4a050892015eefd61ce3f057a2477b2fa1ec5b915cd7ab11afc
java-11-openjdk-headless-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: cbf14ffef111f57952b85d2818f3a60058bc243bcb6f66022f679203b627e5cc
java-11-openjdk-javadoc-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: f93656e7bf8bbc94d32cd29611b9fe1b92f540790819a277c9e059d9cad930c5
java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 62f7b276576829e13caff447dd23dbb0ab52f9415b296311a91b418a3699b6d1
java-11-openjdk-jmods-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: e794f1fe31c01e86c64418b105b0a20eaed732590a2daf83407ff68e662f06f8
java-11-openjdk-src-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 54bd0dd71d67b51e64b03fba52239819d0acbfa4c324640175dbd20e727b3655
java-11-openjdk-static-libs-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 6fa9376776c2d8fb9f69ffa24b50e84ae9b4f7476c10a65ae68f68f0d95f1d4a
Red Hat Enterprise Linux Server - TUS 8.6
SRPM
java-11-openjdk-11.0.16.0.8-1.el8_6.src.rpm
SHA-256: 3a66a4d12a7f5a313221d63d0e090c51ed070ef1ec5fbed07b09903731979721
x86_64
java-11-openjdk-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 9c8bc9f6c93ba8aa8fc94db8ab0d0d117cdc434b4f4a02c6035628d7f76fda48
java-11-openjdk-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: b800a6a17c623c860843e87caad4ae16a84d20c063c7afdcda62e3cd200e2055
java-11-openjdk-debugsource-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: e340eeb505828f358f0d54a3a732ceec9331e163a17b67d75267d6a42e73e638
java-11-openjdk-demo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: d42fac8e23179680e8e50df882bd3fb5b1182191ad6a90a6d5dd29f38d2b37a2
java-11-openjdk-devel-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 003805f64f012aa6559886a49128db085f3403047a4f598874d48d40fe7e701e
java-11-openjdk-devel-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: f0cf0973dfbc320281c5e6ceaf900e8014af5c9e984dd2f7c988bb65623fd9df
java-11-openjdk-headless-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: ad7518522428253d50d4b6ef72ea0ddc7d7458a61ecfe9378a40e40685c367cb
java-11-openjdk-headless-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: b626f391216745b150e3ff021878bc5c53c222a1b5b55414e9aac125a97b5ea4
java-11-openjdk-javadoc-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: e1665f690896ececc1f1f60e8174df71b157a3bd06f27f0583edc964ca3dcd2b
java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 9bed2ba7c297fd34d7e09154cdad71feaefa60a2532a35b8eb5e6a3ee421231e
java-11-openjdk-jmods-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: e725b2f7a4c9e44391f6a8c643ecbbd13779b121128e18053ae9ed2567c58c49
java-11-openjdk-src-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: db2d642fe4b2a91e99b1f53c72b81bed5e4f46ed438c1af2da5d088d440082af
java-11-openjdk-static-libs-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: fc22f61bae0a0ff8a671bb00f8fbbed248aa6daacf27b71679775ac4fd581c5f
Red Hat Enterprise Linux for ARM 64 8
SRPM
java-11-openjdk-11.0.16.0.8-1.el8_6.src.rpm
SHA-256: 3a66a4d12a7f5a313221d63d0e090c51ed070ef1ec5fbed07b09903731979721
aarch64
java-11-openjdk-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 1f758ab391319f8349f4acde6dab0cd703164470b99e0eccad68ba70cdd72b2a
java-11-openjdk-debuginfo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 7c6b6e7ac32848f57e45473730488b5b84211dcc7205ab3f14f97fb8d51cda96
java-11-openjdk-debugsource-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 0b992f64fdaa826ca30cb207a8bfaa40eb34e1e788e3a54a8918b353952d7577
java-11-openjdk-demo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 4dc9cf6b0275b9be10e6b9c0ad3511c5b6b5a91c9579eff80cfd39cf20c952a5
java-11-openjdk-devel-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 4457179fe21171dd2a2854b34d22d4c6fa1cb8daef9f353a1fe79f8ecf538cbf
java-11-openjdk-devel-debuginfo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 496ec910bf066ae355f920a8f250e0ca2977f94863d06948d36a6081f863506b
java-11-openjdk-headless-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 24aac4833acfa0ea26b1ded748a4dc0ec241e6f9c0117de42b966388d4f85420
java-11-openjdk-headless-debuginfo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 5da7bf8e8170c15e7c0fca7a86f743b435141bc6aa1166ab770f6ae1c3760693
java-11-openjdk-javadoc-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: c2f3b20adbf1fb8023ff38ecf2031d898013cf43caae7abf385a80f63ecf8e98
java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 2ac91d55e98e005c43bf19bcd10959f14b094b361673630b939581feeaf2cab8
java-11-openjdk-jmods-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 13e10d3d75e248295544ea3510eb378a445088e0ef70fba5e9011ae6f2eed49a
java-11-openjdk-src-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: c6317cbc74dd48c7be22747b5aecdba18cf67c1f789c5ce48462fcbcd353b554
java-11-openjdk-static-libs-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 34fb9c13d22da813f398ba05c81b8c811ec7a5d3601fc77938b62bb155521805
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6
SRPM
java-11-openjdk-11.0.16.0.8-1.el8_6.src.rpm
SHA-256: 3a66a4d12a7f5a313221d63d0e090c51ed070ef1ec5fbed07b09903731979721
ppc64le
java-11-openjdk-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 62a1291334a03742296456bbb805540509c3c693edcbf168cc28fc989f62150a
java-11-openjdk-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: c6ebd85ebca0779c43e756942d4c6c7724bb40608b8397eb123f9ce4bd5716a8
java-11-openjdk-debugsource-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 37f47bb3c2db76f599c66a18391540a63816a65ea4a10323afc72a79a515219e
java-11-openjdk-demo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 3731c3435e9c7a3626c75c7064af4d3a394798ed346c276c080a56f3d23f89d4
java-11-openjdk-devel-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 8a5b11a04c4a79010524c984b9d585c83c76a64c651b3d323e05f7de8374b1b7
java-11-openjdk-devel-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: f75155d45d616de0419bad6388a02d2505d4407fd0bbd6d5d564c727e0630191
java-11-openjdk-headless-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: e7151937ad4fb4a050892015eefd61ce3f057a2477b2fa1ec5b915cd7ab11afc
java-11-openjdk-headless-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: cbf14ffef111f57952b85d2818f3a60058bc243bcb6f66022f679203b627e5cc
java-11-openjdk-javadoc-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: f93656e7bf8bbc94d32cd29611b9fe1b92f540790819a277c9e059d9cad930c5
java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 62f7b276576829e13caff447dd23dbb0ab52f9415b296311a91b418a3699b6d1
java-11-openjdk-jmods-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: e794f1fe31c01e86c64418b105b0a20eaed732590a2daf83407ff68e662f06f8
java-11-openjdk-src-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 54bd0dd71d67b51e64b03fba52239819d0acbfa4c324640175dbd20e727b3655
java-11-openjdk-static-libs-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 6fa9376776c2d8fb9f69ffa24b50e84ae9b4f7476c10a65ae68f68f0d95f1d4a
Red Hat CodeReady Linux Builder for x86_64 8
SRPM
x86_64
java-11-openjdk-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: b800a6a17c623c860843e87caad4ae16a84d20c063c7afdcda62e3cd200e2055
java-11-openjdk-debugsource-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: e340eeb505828f358f0d54a3a732ceec9331e163a17b67d75267d6a42e73e638
java-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 9e2da5d34512e62fed3a99d080b977e66ab70a3d898a46db83899e16a47dd4b4
java-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 130298c82dc6566ba13e9421376367fddb4a6fb612ece89827df02c1fbc97909
java-11-openjdk-devel-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: f0cf0973dfbc320281c5e6ceaf900e8014af5c9e984dd2f7c988bb65623fd9df
java-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: b6d36ad0427e9682326e1e548e30da920027d0f994015f5c6cc98a11cfa76d53
java-11-openjdk-devel-fastdebug-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 951e65758b73bbacad2db226201009eee6f93e21d8fb7ef28184f3ebf17ff793
java-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: f3ff9a84985a259e083f7aeed1ec3962033ea5f7dbd0f1326571c414962b984a
java-11-openjdk-devel-slowdebug-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: c883dab7b831ff5a291bfe7bf4e3c0636dd23ee2f8952201cc17186c3c379bdb
java-11-openjdk-fastdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 817406b77b5e16ce955788a94692912387e9bf4277c6ba0e382b73c962da8ee2
java-11-openjdk-fastdebug-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: ec0909a4ae8246260bacb4567a39d871764083dd45044317490b491b00f16735
java-11-openjdk-headless-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: b626f391216745b150e3ff021878bc5c53c222a1b5b55414e9aac125a97b5ea4
java-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 900deabe101f0853f58097a9ce181c1cc0157a7b5f8df55aa5dd65094291264d
java-11-openjdk-headless-fastdebug-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 0a6ec0486b8a01b71e9adfb9286a2ffe6e2aeebb93c46cfeb4a65a208653d2bf
java-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: e1a43be71cd48bff60ec0afdd8871090ee871213636995221af30c21a4cc3f31
java-11-openjdk-headless-slowdebug-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 3720a3f9f73e3a560e0fdc81ae8809f91fdde22915c589a747b9174587a4aad6
java-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: f45c0a5772ca3d9f02405cb8c2e21a439793266b0ae0a4023d4cfeafe7d9c4d7
java-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: fcca1b8ee9edfe02aa558a643f7b203bc9ef8ebb761fdd494a73191fcd698242
java-11-openjdk-slowdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 16e7cd4f3ffd9c522d2b3674ba3aa8f7cdc3a02fe20dbea13af5873cc2c09432
java-11-openjdk-slowdebug-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 6ac96e7bc3282b8ab1b68e9efbcec4f4a78395e9be22340453ce428a76b9b9c4
java-11-openjdk-src-fastdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: eaa873e5294a01df43ff7604b434139bfdfa5971b04c04fdb700ea957d19475d
java-11-openjdk-src-slowdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: b87dbf2f3eefd80ece4eae94f463718946cff490bbe08a0cfe77a20c7c6bba60
java-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 995f0f6c80d909bb9d3d6c5f68f1299cf865a58a85112adc048b94732bbcf928
java-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 370665495fcdb480154bffe480f3554fb425733a05b75566f96862bb9a1dc42a
Red Hat CodeReady Linux Builder for Power, little endian 8
SRPM
ppc64le
java-11-openjdk-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: c6ebd85ebca0779c43e756942d4c6c7724bb40608b8397eb123f9ce4bd5716a8
java-11-openjdk-debugsource-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 37f47bb3c2db76f599c66a18391540a63816a65ea4a10323afc72a79a515219e
java-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 8fd2d4276e27ec41f2f7c3a455ee872611827f615d0b087a5e6a7b251b1b059e
java-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 57bb5f9e343142ffefda1127195491cee42a15c404020898eefcdb1fcd043f82
java-11-openjdk-devel-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: f75155d45d616de0419bad6388a02d2505d4407fd0bbd6d5d564c727e0630191
java-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 92d5b7a16973f72427b2200654151789853ec0a36a254ca8ea1b1dc40cbb21c4
java-11-openjdk-devel-fastdebug-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: f3c28ff15dda19b7a139f38165acb37e4ee68df23afc4994ef9de6803efb483b
java-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 4d98531acfcfd761226bbbe9e9aba727c2265469a3adf83053859b13843a0b16
java-11-openjdk-devel-slowdebug-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: f57f78ca0d974c53f9d2463d31192d54b6b25f976096e9dc7db5b347d0ba480d
java-11-openjdk-fastdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 854c6ff538175101663ca290e21a4946676df3c27f825bb90956aafeae5fca7c
java-11-openjdk-fastdebug-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 122b9f79e3d8d56c3a885506cb7d201abef16f56d783f8b3dedfb994c0bd94e8
java-11-openjdk-headless-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: cbf14ffef111f57952b85d2818f3a60058bc243bcb6f66022f679203b627e5cc
java-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 1a7b9ecfd92f5751704bbb0d618f5e9bdce0a663b2dcb0d8accdc146e598ee16
java-11-openjdk-headless-fastdebug-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 0a07ea85246af83d41126edf5c3ba537505ad7ab81a0fbb04a8e13a9058cb496
java-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 9b97385f7e68d2fa8c7891e0d52994a32b07b5ed0f8c24e027d9209eb5dc5857
java-11-openjdk-headless-slowdebug-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 36eb30dba6aaef7f06eb60b4b1e3b2b5bf7148c90560b3894caed500b5c2ed14
java-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: d3eb4779e0c7c379acd6d5df4c69581f1b844328cf35fe35d49a1991af060972
java-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 26b63056ef650b1469374ba39bb18142130b7583a2ebc7e158fe3d56c30202e0
java-11-openjdk-slowdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 01ed5274c16e902916270b29bd761212b102658213834510d8d974d7c551ccc6
java-11-openjdk-slowdebug-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 5acf513069f9a851705ca4cf87e1ea2c6553c7e503af4dfa5c87d2ae159d02fa
java-11-openjdk-src-fastdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: f959a4390f08bdd411f9d526435831f063c5398a8f266ecaaadeddc736909646
java-11-openjdk-src-slowdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: cd5e9add68224163d6b49b3951bfb77882aef70b367b972c76fa5245c94add3b
java-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 359c430661b137bb9b4adae7131e808f64f356efbf00318c16d07902ac0d094d
java-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 7fb5b2f3ffc3be334381f4fc168688915d137aadcf9833a73114218629b686b4
Red Hat CodeReady Linux Builder for ARM 64 8
SRPM
aarch64
java-11-openjdk-debuginfo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 7c6b6e7ac32848f57e45473730488b5b84211dcc7205ab3f14f97fb8d51cda96
java-11-openjdk-debugsource-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 0b992f64fdaa826ca30cb207a8bfaa40eb34e1e788e3a54a8918b353952d7577
java-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: d75362c3fbd4f8b161c08793742437a960e1472f32354cdcad41dcc3844136ad
java-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 9b3c65c77061e037a4c6941fd704fa33bb4211b2f04bb9ab9d3394cb4e61c285
java-11-openjdk-devel-debuginfo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 496ec910bf066ae355f920a8f250e0ca2977f94863d06948d36a6081f863506b
java-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 759270ead8a4d5c1b1cdf047a9bb9633d5e374f6995e86dffa5025bfb3d73f7f
java-11-openjdk-devel-fastdebug-debuginfo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 963f3504adefb0b0052352443ff611781cb99e6f3586e94b4afe60889cbfd6b5
java-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 17c350c433fd917c91f64cefd1f8b7cdc489b43675e7f7dc7488e45815e70f2f
java-11-openjdk-devel-slowdebug-debuginfo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 52e5122186e5dc4eddc0f02d92b0d61aaa3dcbe8c5b8a22628b709d6a7afd782
java-11-openjdk-fastdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 037dd701cab18f6d941aa63307f6a5da46433f0ebe84809738e8da2a388c339f
java-11-openjdk-fastdebug-debuginfo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: d94a05f38a91575978e7524f6e53b67aa8b60e41fa37c84f7fe7ac74f0549fbe
java-11-openjdk-headless-debuginfo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 5da7bf8e8170c15e7c0fca7a86f743b435141bc6aa1166ab770f6ae1c3760693
java-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 01d91960c64fa6cca39b156debbbe28edf775652a55e12564f8cdf103c460d23
java-11-openjdk-headless-fastdebug-debuginfo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: bb965191cb0bd4e5b4427b9f623559210b6254a74d750cff0cf901e7a31a7d69
java-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: f4f0a27b63c443d0835c3974b7372ed9a62372ecb71c11fc09f326a2a0d54270
java-11-openjdk-headless-slowdebug-debuginfo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 4d2902b9993edfc5f9ceff6375a0fd49256cad6a9ac5dcef8ec1015855562cd4
java-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: d0462a39a35b876b59b257fa94c1408de0f1e6e840c44a24144beb3f88cd2067
java-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 635c29136232a06fe7de05db5b37c9f9b8aed3828d0d3bd709be4a31eb83ba78
java-11-openjdk-slowdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: b09758b6901307c4e4d5baea0ab333ab1ff736547a87ee50504caeae2a97d65b
java-11-openjdk-slowdebug-debuginfo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: d4f50865b3fb683f16689a209dddc618dac0205dc23ed136074117cfd540cc6b
java-11-openjdk-src-fastdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 8163d3f8812208a0266faf3ee1fb5288ba425fef66a9a9f214681408a3979dff
java-11-openjdk-src-slowdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 4fc67d061bec765aa297ed3c3ee59be1caab8aca741cf51520f1b03ad034da4f
java-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 4b6882d6e0a942a653fe440d1e2eedd1d296a6ee64773aeb73c254e88a906129
java-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 22cadedc301e26e63aa0520e94a646cdde58507357b287d821c8923b6d8fca04
Red Hat CodeReady Linux Builder for IBM z Systems 8
SRPM
s390x
java-11-openjdk-debuginfo-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 29363991f25257487597ecac93d9d6053a2723d1a4d483479af16949114c4aca
java-11-openjdk-debugsource-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 5537511156bb4e353e498101e3b0707830ecd4067e4caba604b1e2376b71a61e
java-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 46e4a7aa10a6e0ffbb5c06670d05e1b160d723ae76509129d84107e159ed6c13
java-11-openjdk-devel-debuginfo-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 07c4b58a216af713077c79ba844d0a80b113e1b38df53c4c422f99abcf7b604b
java-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: a8fbe66f2bd56612b4dd0b4fbf29f201aa0a3496edd515e5b04172283f679712
java-11-openjdk-devel-slowdebug-debuginfo-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 0c97402c7d68d27be511057e19ad95568ea701ac2b385351b0783dbf7f50d53c
java-11-openjdk-headless-debuginfo-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 6127fdc79bc0442685016648862003bea34909f6d762810dd16e236ddcb2a8b7
java-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: f55bf74b2b0f5953b16b9e169842be1244b2b6a0be9ae0a8a76fe42c50dd5996
java-11-openjdk-headless-slowdebug-debuginfo-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: fa700b2775ca99eaad373a4d2844c958278af4b4ef2c59dc0db882ba4010fd6f
java-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 3423fa3ef63508b89fada01c969dc1a8a9f151a14566b6fc392c6edd9de17bdf
java-11-openjdk-slowdebug-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: b3f5776660076215b941e1041528891f655afcc702ad93ac50f6555d034001a1
java-11-openjdk-slowdebug-debuginfo-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 595ccb7900c7c038956028a706202a17de4e5e9ee2291072bafa7255c18d2ef8
java-11-openjdk-src-slowdebug-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 1b7d777cef8f99e69dd62e666f117b6de337e5f1e7883fac5dd73355c65f6d25
java-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: de2482b4cb3af9ab30375c5b68eb4be465664c91268f381da8aaaa3addc405f8
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6
SRPM
java-11-openjdk-11.0.16.0.8-1.el8_6.src.rpm
SHA-256: 3a66a4d12a7f5a313221d63d0e090c51ed070ef1ec5fbed07b09903731979721
aarch64
java-11-openjdk-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 1f758ab391319f8349f4acde6dab0cd703164470b99e0eccad68ba70cdd72b2a
java-11-openjdk-debuginfo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 7c6b6e7ac32848f57e45473730488b5b84211dcc7205ab3f14f97fb8d51cda96
java-11-openjdk-debugsource-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 0b992f64fdaa826ca30cb207a8bfaa40eb34e1e788e3a54a8918b353952d7577
java-11-openjdk-demo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 4dc9cf6b0275b9be10e6b9c0ad3511c5b6b5a91c9579eff80cfd39cf20c952a5
java-11-openjdk-devel-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 4457179fe21171dd2a2854b34d22d4c6fa1cb8daef9f353a1fe79f8ecf538cbf
java-11-openjdk-devel-debuginfo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 496ec910bf066ae355f920a8f250e0ca2977f94863d06948d36a6081f863506b
java-11-openjdk-headless-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 24aac4833acfa0ea26b1ded748a4dc0ec241e6f9c0117de42b966388d4f85420
java-11-openjdk-headless-debuginfo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 5da7bf8e8170c15e7c0fca7a86f743b435141bc6aa1166ab770f6ae1c3760693
java-11-openjdk-javadoc-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: c2f3b20adbf1fb8023ff38ecf2031d898013cf43caae7abf385a80f63ecf8e98
java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 2ac91d55e98e005c43bf19bcd10959f14b094b361673630b939581feeaf2cab8
java-11-openjdk-jmods-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 13e10d3d75e248295544ea3510eb378a445088e0ef70fba5e9011ae6f2eed49a
java-11-openjdk-src-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: c6317cbc74dd48c7be22747b5aecdba18cf67c1f789c5ce48462fcbcd353b554
java-11-openjdk-static-libs-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 34fb9c13d22da813f398ba05c81b8c811ec7a5d3601fc77938b62bb155521805
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6
SRPM
java-11-openjdk-11.0.16.0.8-1.el8_6.src.rpm
SHA-256: 3a66a4d12a7f5a313221d63d0e090c51ed070ef1ec5fbed07b09903731979721
x86_64
java-11-openjdk-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 9c8bc9f6c93ba8aa8fc94db8ab0d0d117cdc434b4f4a02c6035628d7f76fda48
java-11-openjdk-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: b800a6a17c623c860843e87caad4ae16a84d20c063c7afdcda62e3cd200e2055
java-11-openjdk-debugsource-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: e340eeb505828f358f0d54a3a732ceec9331e163a17b67d75267d6a42e73e638
java-11-openjdk-demo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: d42fac8e23179680e8e50df882bd3fb5b1182191ad6a90a6d5dd29f38d2b37a2
java-11-openjdk-devel-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 003805f64f012aa6559886a49128db085f3403047a4f598874d48d40fe7e701e
java-11-openjdk-devel-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: f0cf0973dfbc320281c5e6ceaf900e8014af5c9e984dd2f7c988bb65623fd9df
java-11-openjdk-headless-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: ad7518522428253d50d4b6ef72ea0ddc7d7458a61ecfe9378a40e40685c367cb
java-11-openjdk-headless-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: b626f391216745b150e3ff021878bc5c53c222a1b5b55414e9aac125a97b5ea4
java-11-openjdk-javadoc-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: e1665f690896ececc1f1f60e8174df71b157a3bd06f27f0583edc964ca3dcd2b
java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 9bed2ba7c297fd34d7e09154cdad71feaefa60a2532a35b8eb5e6a3ee421231e
java-11-openjdk-jmods-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: e725b2f7a4c9e44391f6a8c643ecbbd13779b121128e18053ae9ed2567c58c49
java-11-openjdk-src-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: db2d642fe4b2a91e99b1f53c72b81bed5e4f46ed438c1af2da5d088d440082af
java-11-openjdk-static-libs-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: fc22f61bae0a0ff8a671bb00f8fbbed248aa6daacf27b71679775ac4fd581c5f
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.6
SRPM
x86_64
java-11-openjdk-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: b800a6a17c623c860843e87caad4ae16a84d20c063c7afdcda62e3cd200e2055
java-11-openjdk-debugsource-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: e340eeb505828f358f0d54a3a732ceec9331e163a17b67d75267d6a42e73e638
java-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 9e2da5d34512e62fed3a99d080b977e66ab70a3d898a46db83899e16a47dd4b4
java-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 130298c82dc6566ba13e9421376367fddb4a6fb612ece89827df02c1fbc97909
java-11-openjdk-devel-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: f0cf0973dfbc320281c5e6ceaf900e8014af5c9e984dd2f7c988bb65623fd9df
java-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: b6d36ad0427e9682326e1e548e30da920027d0f994015f5c6cc98a11cfa76d53
java-11-openjdk-devel-fastdebug-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 951e65758b73bbacad2db226201009eee6f93e21d8fb7ef28184f3ebf17ff793
java-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: f3ff9a84985a259e083f7aeed1ec3962033ea5f7dbd0f1326571c414962b984a
java-11-openjdk-devel-slowdebug-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: c883dab7b831ff5a291bfe7bf4e3c0636dd23ee2f8952201cc17186c3c379bdb
java-11-openjdk-fastdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 817406b77b5e16ce955788a94692912387e9bf4277c6ba0e382b73c962da8ee2
java-11-openjdk-fastdebug-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: ec0909a4ae8246260bacb4567a39d871764083dd45044317490b491b00f16735
java-11-openjdk-headless-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: b626f391216745b150e3ff021878bc5c53c222a1b5b55414e9aac125a97b5ea4
java-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 900deabe101f0853f58097a9ce181c1cc0157a7b5f8df55aa5dd65094291264d
java-11-openjdk-headless-fastdebug-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 0a6ec0486b8a01b71e9adfb9286a2ffe6e2aeebb93c46cfeb4a65a208653d2bf
java-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: e1a43be71cd48bff60ec0afdd8871090ee871213636995221af30c21a4cc3f31
java-11-openjdk-headless-slowdebug-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 3720a3f9f73e3a560e0fdc81ae8809f91fdde22915c589a747b9174587a4aad6
java-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: f45c0a5772ca3d9f02405cb8c2e21a439793266b0ae0a4023d4cfeafe7d9c4d7
java-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: fcca1b8ee9edfe02aa558a643f7b203bc9ef8ebb761fdd494a73191fcd698242
java-11-openjdk-slowdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 16e7cd4f3ffd9c522d2b3674ba3aa8f7cdc3a02fe20dbea13af5873cc2c09432
java-11-openjdk-slowdebug-debuginfo-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 6ac96e7bc3282b8ab1b68e9efbcec4f4a78395e9be22340453ce428a76b9b9c4
java-11-openjdk-src-fastdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: eaa873e5294a01df43ff7604b434139bfdfa5971b04c04fdb700ea957d19475d
java-11-openjdk-src-slowdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: b87dbf2f3eefd80ece4eae94f463718946cff490bbe08a0cfe77a20c7c6bba60
java-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 995f0f6c80d909bb9d3d6c5f68f1299cf865a58a85112adc048b94732bbcf928
java-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el8_6.x86_64.rpm
SHA-256: 370665495fcdb480154bffe480f3554fb425733a05b75566f96862bb9a1dc42a
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.6
SRPM
ppc64le
java-11-openjdk-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: c6ebd85ebca0779c43e756942d4c6c7724bb40608b8397eb123f9ce4bd5716a8
java-11-openjdk-debugsource-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 37f47bb3c2db76f599c66a18391540a63816a65ea4a10323afc72a79a515219e
java-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 8fd2d4276e27ec41f2f7c3a455ee872611827f615d0b087a5e6a7b251b1b059e
java-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 57bb5f9e343142ffefda1127195491cee42a15c404020898eefcdb1fcd043f82
java-11-openjdk-devel-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: f75155d45d616de0419bad6388a02d2505d4407fd0bbd6d5d564c727e0630191
java-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 92d5b7a16973f72427b2200654151789853ec0a36a254ca8ea1b1dc40cbb21c4
java-11-openjdk-devel-fastdebug-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: f3c28ff15dda19b7a139f38165acb37e4ee68df23afc4994ef9de6803efb483b
java-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 4d98531acfcfd761226bbbe9e9aba727c2265469a3adf83053859b13843a0b16
java-11-openjdk-devel-slowdebug-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: f57f78ca0d974c53f9d2463d31192d54b6b25f976096e9dc7db5b347d0ba480d
java-11-openjdk-fastdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 854c6ff538175101663ca290e21a4946676df3c27f825bb90956aafeae5fca7c
java-11-openjdk-fastdebug-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 122b9f79e3d8d56c3a885506cb7d201abef16f56d783f8b3dedfb994c0bd94e8
java-11-openjdk-headless-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: cbf14ffef111f57952b85d2818f3a60058bc243bcb6f66022f679203b627e5cc
java-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 1a7b9ecfd92f5751704bbb0d618f5e9bdce0a663b2dcb0d8accdc146e598ee16
java-11-openjdk-headless-fastdebug-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 0a07ea85246af83d41126edf5c3ba537505ad7ab81a0fbb04a8e13a9058cb496
java-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 9b97385f7e68d2fa8c7891e0d52994a32b07b5ed0f8c24e027d9209eb5dc5857
java-11-openjdk-headless-slowdebug-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 36eb30dba6aaef7f06eb60b4b1e3b2b5bf7148c90560b3894caed500b5c2ed14
java-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: d3eb4779e0c7c379acd6d5df4c69581f1b844328cf35fe35d49a1991af060972
java-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 26b63056ef650b1469374ba39bb18142130b7583a2ebc7e158fe3d56c30202e0
java-11-openjdk-slowdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 01ed5274c16e902916270b29bd761212b102658213834510d8d974d7c551ccc6
java-11-openjdk-slowdebug-debuginfo-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 5acf513069f9a851705ca4cf87e1ea2c6553c7e503af4dfa5c87d2ae159d02fa
java-11-openjdk-src-fastdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: f959a4390f08bdd411f9d526435831f063c5398a8f266ecaaadeddc736909646
java-11-openjdk-src-slowdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: cd5e9add68224163d6b49b3951bfb77882aef70b367b972c76fa5245c94add3b
java-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 359c430661b137bb9b4adae7131e808f64f356efbf00318c16d07902ac0d094d
java-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el8_6.ppc64le.rpm
SHA-256: 7fb5b2f3ffc3be334381f4fc168688915d137aadcf9833a73114218629b686b4
Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 8.6
SRPM
s390x
java-11-openjdk-debuginfo-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 29363991f25257487597ecac93d9d6053a2723d1a4d483479af16949114c4aca
java-11-openjdk-debugsource-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 5537511156bb4e353e498101e3b0707830ecd4067e4caba604b1e2376b71a61e
java-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 46e4a7aa10a6e0ffbb5c06670d05e1b160d723ae76509129d84107e159ed6c13
java-11-openjdk-devel-debuginfo-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 07c4b58a216af713077c79ba844d0a80b113e1b38df53c4c422f99abcf7b604b
java-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: a8fbe66f2bd56612b4dd0b4fbf29f201aa0a3496edd515e5b04172283f679712
java-11-openjdk-devel-slowdebug-debuginfo-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 0c97402c7d68d27be511057e19ad95568ea701ac2b385351b0783dbf7f50d53c
java-11-openjdk-headless-debuginfo-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 6127fdc79bc0442685016648862003bea34909f6d762810dd16e236ddcb2a8b7
java-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: f55bf74b2b0f5953b16b9e169842be1244b2b6a0be9ae0a8a76fe42c50dd5996
java-11-openjdk-headless-slowdebug-debuginfo-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: fa700b2775ca99eaad373a4d2844c958278af4b4ef2c59dc0db882ba4010fd6f
java-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 3423fa3ef63508b89fada01c969dc1a8a9f151a14566b6fc392c6edd9de17bdf
java-11-openjdk-slowdebug-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: b3f5776660076215b941e1041528891f655afcc702ad93ac50f6555d034001a1
java-11-openjdk-slowdebug-debuginfo-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 595ccb7900c7c038956028a706202a17de4e5e9ee2291072bafa7255c18d2ef8
java-11-openjdk-src-slowdebug-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: 1b7d777cef8f99e69dd62e666f117b6de337e5f1e7883fac5dd73355c65f6d25
java-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el8_6.s390x.rpm
SHA-256: de2482b4cb3af9ab30375c5b68eb4be465664c91268f381da8aaaa3addc405f8
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.6
SRPM
aarch64
java-11-openjdk-debuginfo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 7c6b6e7ac32848f57e45473730488b5b84211dcc7205ab3f14f97fb8d51cda96
java-11-openjdk-debugsource-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 0b992f64fdaa826ca30cb207a8bfaa40eb34e1e788e3a54a8918b353952d7577
java-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: d75362c3fbd4f8b161c08793742437a960e1472f32354cdcad41dcc3844136ad
java-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 9b3c65c77061e037a4c6941fd704fa33bb4211b2f04bb9ab9d3394cb4e61c285
java-11-openjdk-devel-debuginfo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 496ec910bf066ae355f920a8f250e0ca2977f94863d06948d36a6081f863506b
java-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 759270ead8a4d5c1b1cdf047a9bb9633d5e374f6995e86dffa5025bfb3d73f7f
java-11-openjdk-devel-fastdebug-debuginfo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 963f3504adefb0b0052352443ff611781cb99e6f3586e94b4afe60889cbfd6b5
java-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 17c350c433fd917c91f64cefd1f8b7cdc489b43675e7f7dc7488e45815e70f2f
java-11-openjdk-devel-slowdebug-debuginfo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 52e5122186e5dc4eddc0f02d92b0d61aaa3dcbe8c5b8a22628b709d6a7afd782
java-11-openjdk-fastdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 037dd701cab18f6d941aa63307f6a5da46433f0ebe84809738e8da2a388c339f
java-11-openjdk-fastdebug-debuginfo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: d94a05f38a91575978e7524f6e53b67aa8b60e41fa37c84f7fe7ac74f0549fbe
java-11-openjdk-headless-debuginfo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 5da7bf8e8170c15e7c0fca7a86f743b435141bc6aa1166ab770f6ae1c3760693
java-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 01d91960c64fa6cca39b156debbbe28edf775652a55e12564f8cdf103c460d23
java-11-openjdk-headless-fastdebug-debuginfo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: bb965191cb0bd4e5b4427b9f623559210b6254a74d750cff0cf901e7a31a7d69
java-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: f4f0a27b63c443d0835c3974b7372ed9a62372ecb71c11fc09f326a2a0d54270
java-11-openjdk-headless-slowdebug-debuginfo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 4d2902b9993edfc5f9ceff6375a0fd49256cad6a9ac5dcef8ec1015855562cd4
java-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: d0462a39a35b876b59b257fa94c1408de0f1e6e840c44a24144beb3f88cd2067
java-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 635c29136232a06fe7de05db5b37c9f9b8aed3828d0d3bd709be4a31eb83ba78
java-11-openjdk-slowdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: b09758b6901307c4e4d5baea0ab333ab1ff736547a87ee50504caeae2a97d65b
java-11-openjdk-slowdebug-debuginfo-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: d4f50865b3fb683f16689a209dddc618dac0205dc23ed136074117cfd540cc6b
java-11-openjdk-src-fastdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 8163d3f8812208a0266faf3ee1fb5288ba425fef66a9a9f214681408a3979dff
java-11-openjdk-src-slowdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 4fc67d061bec765aa297ed3c3ee59be1caab8aca741cf51520f1b03ad034da4f
java-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 4b6882d6e0a942a653fe440d1e2eedd1d296a6ee64773aeb73c254e88a906129
java-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el8_6.aarch64.rpm
SHA-256: 22cadedc301e26e63aa0520e94a646cdde58507357b287d821c8923b6d8fca04
Related news
Red Hat Security Advisory 2024-8080-03 - An update is now available for Red Hat JBoss Enterprise Application Platform 7.4. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link in the References section. Issues addressed include cross site scripting and denial of service vulnerabilities.
Gentoo Linux Security Advisory 202401-25 - Multiple vulnerabilities have been discovered in OpenJDK, the worst of which can lead to remote code execution. Versions greater than or equal to 11.0.19_p7:11 are affected.
Dell PowerStore versions prior to 3.5 contain an improper verification of cryptographic signature vulnerability. An attacker can trick a high privileged user to install a malicious binary by bypassing the existing cryptographic signature checks
Wyse Management Suite 3.8 and below contain an improper access control vulnerability. A authenticated malicious admin user can edit general client policy for which the user is not authorized.
IBM Cloud Transformation Advisor 2.0.1 through 3.3.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 237214.
Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: Upload). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Successful attacks of this vulnerability can result in takeover of Oracle Web Applications Desktop Integrator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Red Hat Security Advisory 2022-6262-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.6.61. Issues addressed include a bypass vulnerability.
Red Hat OpenShift Container Platform release 3.11.784 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 3.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-39226: grafana: Snapshot authentication bypass
Red Hat Security Advisory 2022-6053-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.56.
Red Hat Security Advisory 2022-5909-01 - Openshift Logging Bug Fix Release. Issues addressed include denial of service and out of bounds read vulnerabilities.
Red Hat Security Advisory 2022-5908-01 - Openshift Logging Bug Fix Release. Issues addressed include denial of service and out of bounds read vulnerabilities.
Openshift Logging Bug Fix Release (5.2.13) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS
Openshift Logging Bug Fix Release (5.3.10) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS
Red Hat OpenShift Container Platform release 4.10.25 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-23772: golang: math/big: uncontrolled memory consumption due to an unhandled overflow via Rat.SetString * CVE-2022-24675: golang: encoding/pem: fix stack overflow in Decode * CVE-2022-24921...
Red Hat Security Advisory 2022-5754-01 - The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. This release of the Red Hat build of OpenJDK 8 for portable Linux serves as a replacement for Red Hat build of OpenJDK 8 and includes security and bug fixes as well as enhancements. For further information, refer to the release notes linked to in the References section.
The Red Hat build of OpenJDK 17 (java-17-openjdk) is now available for portable Linux. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-21549: OpenJDK: random exponentials issue (Libraries, 8283875) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
The Red Hat build of OpenJDK 17 (java-17-openjdk) is now available for Windows. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-21549: OpenJDK: random exponentials issue (Libraries, 8283875) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
The Red Hat Build of OpenJDK 11 (java-11-openjdk) is now available for portable Linux. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
The Red Hat build of OpenJDK 8 (java-1.8.0-openjdk) is now available for portable Linux. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
Red Hat Security Advisory 2022-5681-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Red Hat Security Advisory 2022-5709-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Red Hat Security Advisory 2022-5687-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Red Hat Security Advisory 2022-5685-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
An update for java-17-openjdk is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-21549: OpenJDK: random exponentials issue (Libraries, 8283875) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-17-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-21549: OpenJDK: random exponentials issue (Libraries, 8283875) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. The Apache Xalan Java project is dormant and in the process of being retired. No future releases of Apache Xalan Java to address this issue are expected. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.
Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Trade Finance accessible data as well as unauthorized access to critical data or complete access to all Oracle Banking Trade Finance accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N).
Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Trade Finance accessible data as well as unauthorized access to critical data or complete access to all Oracle Banking Trade Finance accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N).
Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Trade Finance accessible data as well as unauthorized access to critical data or complete access to all Oracle Banking Trade Finance accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N).
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. The Apache Xalan Java project is dormant and in the process of being retired. No future releases of Apache Xalan Java to address this issue are expected. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.