Headline
RHSA-2022:5697: Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859)
- CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)
- CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
Synopsis
Important: java-1.8.0-openjdk security and bug fix update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
- OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)
- OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
- OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-8, openjdk-8] (BZ#2099912)
- Revert to disabling system security properties and FIPS mode support together [rhel-8, openjdk-8] (BZ#2108565)
- SecretKey generate/import operations don’t add the CKA_SIGN attribute in FIPS mode [rhel-8, openjdk-8] (BZ#2108567)
- Detect NSS at Runtime for FIPS detection [rhel-8, openjdk-11] (BZ#2108667)
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
All running instances of OpenJDK Java must be restarted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
- Red Hat Enterprise Linux Server - AUS 8.4 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.4 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
- Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64
- Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le
- Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64
Fixes
- BZ - 2099912 - rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-8, openjdk-8] [rhel-8.4.0.z]
- BZ - 2108540 - CVE-2022-21540 OpenJDK: class compilation issue (Hotspot, 8281859)
- BZ - 2108543 - CVE-2022-21541 OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)
- BZ - 2108554 - CVE-2022-34169 OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
- BZ - 2108565 - Revert to disabling system security properties and FIPS mode support together [rhel-8, openjdk-8] [rhel-8.4.0.z]
- BZ - 2108567 - SecretKey generate/import operations don’t add the CKA_SIGN attribute in FIPS mode [rhel-8, openjdk-8] [rhel-8.4.0.z]
- BZ - 2108667 - Detect NSS at Runtime for FIPS detection [rhel-8, openjdk-11] [rhel-8.4.0.z]
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4
SRPM
java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.src.rpm
SHA-256: bec7ea6c380b36f521765966a549daea3ef3c21eb5978cef753e285b992e7fbe
x86_64
java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: bdf5a6b9cd2c12b200237da84532e04258c58b613e855b298ed400dbf7d5cf5d
java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 3b9a0695d3df1e5ccd125892178d12dc1d0ec6397d82b8cd1f5abb2d9f05acae
java-1.8.0-openjdk-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: a6775c2372040dc2df57172ead47b3c641955ecb6a80841abc22b981ab7b2524
java-1.8.0-openjdk-debugsource-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 6e8e40b18b1c36598aa209901395eba9a74b3bff5d465ad05ba867135d3fa037
java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 34c48bd0a881b03724befea9db1f3e26a35a2edf4a59e4c87175ecf354bcf1a1
java-1.8.0-openjdk-demo-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: abac86b0e8cc2173dccddf3028597412dd274beeba12a737a5c30797047ff98e
java-1.8.0-openjdk-demo-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: c052d31d0bc79864d6e09b496db5656c952dc7496a0f0f5642aa097a3b6906cf
java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: d4b68c70c5c0ac4567d80824ae19b74a02d6f3cd420a09d065523c060f0d8580
java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: b359f140445ea92989b298f4a4eb23c7c0d3e6efb9e9066f0a8a4aaf0d1423ec
java-1.8.0-openjdk-devel-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 22ab032aaecb2745306c368ca8d9b71dd48e3c0d8c78803c008e379ce7b029e4
java-1.8.0-openjdk-devel-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: d8a464b5fda29671820e38f5d79a7017c914f4296feeda67e7b78877567b3805
java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 936ce83fd3786af9a9e9e76e75c5a9df50d99dd3ec33c496f66e1a7b8bc366ca
java-1.8.0-openjdk-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 3cf6bc23cde23f7489abde021c232b9b98249275e7f67b7586d61a807d6c6f56
java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 8d443fd45534241d50dbbbaae7c1307038b482f1a2776480570aa3f5c86ed005
java-1.8.0-openjdk-headless-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 9ddd4538b4d01d3aaee18401832ecc6bf685a061a8df412ea8391136a47cea46
java-1.8.0-openjdk-headless-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 39c1400fd1c21c5d793d2e1a54290a16cd0845fb4db94e0c60ea835a6b0316d9
java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 3c01c74fdef5447bd3ba511b4cffcc163d3ac67506638e86bdf246188e6b633c
java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el8_4.noarch.rpm
SHA-256: 6e1d9567630259dc56705b5b1de3c22a018c3f6c4681c44cd5b90ab2713205b0
java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el8_4.noarch.rpm
SHA-256: 439f5b6a6449a5b0ec1cc7bc1560297defa42544a4099afe937e7cd1473ccb12
java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: acbd61ffe943e8899b97d415ed9c89f066add57ec5d654729eebdd694c683914
java-1.8.0-openjdk-src-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: ad8eb59dfbb88f898326461ee0ed7a48159c613db9c9213ee3a86faf0e0dd291
Red Hat Enterprise Linux Server - AUS 8.4
SRPM
java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.src.rpm
SHA-256: bec7ea6c380b36f521765966a549daea3ef3c21eb5978cef753e285b992e7fbe
x86_64
java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: bdf5a6b9cd2c12b200237da84532e04258c58b613e855b298ed400dbf7d5cf5d
java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 3b9a0695d3df1e5ccd125892178d12dc1d0ec6397d82b8cd1f5abb2d9f05acae
java-1.8.0-openjdk-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: a6775c2372040dc2df57172ead47b3c641955ecb6a80841abc22b981ab7b2524
java-1.8.0-openjdk-debugsource-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 6e8e40b18b1c36598aa209901395eba9a74b3bff5d465ad05ba867135d3fa037
java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 34c48bd0a881b03724befea9db1f3e26a35a2edf4a59e4c87175ecf354bcf1a1
java-1.8.0-openjdk-demo-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: abac86b0e8cc2173dccddf3028597412dd274beeba12a737a5c30797047ff98e
java-1.8.0-openjdk-demo-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: c052d31d0bc79864d6e09b496db5656c952dc7496a0f0f5642aa097a3b6906cf
java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: d4b68c70c5c0ac4567d80824ae19b74a02d6f3cd420a09d065523c060f0d8580
java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: b359f140445ea92989b298f4a4eb23c7c0d3e6efb9e9066f0a8a4aaf0d1423ec
java-1.8.0-openjdk-devel-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 22ab032aaecb2745306c368ca8d9b71dd48e3c0d8c78803c008e379ce7b029e4
java-1.8.0-openjdk-devel-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: d8a464b5fda29671820e38f5d79a7017c914f4296feeda67e7b78877567b3805
java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 936ce83fd3786af9a9e9e76e75c5a9df50d99dd3ec33c496f66e1a7b8bc366ca
java-1.8.0-openjdk-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 3cf6bc23cde23f7489abde021c232b9b98249275e7f67b7586d61a807d6c6f56
java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 8d443fd45534241d50dbbbaae7c1307038b482f1a2776480570aa3f5c86ed005
java-1.8.0-openjdk-headless-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 9ddd4538b4d01d3aaee18401832ecc6bf685a061a8df412ea8391136a47cea46
java-1.8.0-openjdk-headless-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 39c1400fd1c21c5d793d2e1a54290a16cd0845fb4db94e0c60ea835a6b0316d9
java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 3c01c74fdef5447bd3ba511b4cffcc163d3ac67506638e86bdf246188e6b633c
java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el8_4.noarch.rpm
SHA-256: 6e1d9567630259dc56705b5b1de3c22a018c3f6c4681c44cd5b90ab2713205b0
java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el8_4.noarch.rpm
SHA-256: 439f5b6a6449a5b0ec1cc7bc1560297defa42544a4099afe937e7cd1473ccb12
java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: acbd61ffe943e8899b97d415ed9c89f066add57ec5d654729eebdd694c683914
java-1.8.0-openjdk-src-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: ad8eb59dfbb88f898326461ee0ed7a48159c613db9c9213ee3a86faf0e0dd291
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4
SRPM
java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.src.rpm
SHA-256: bec7ea6c380b36f521765966a549daea3ef3c21eb5978cef753e285b992e7fbe
s390x
java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.s390x.rpm
SHA-256: 775e5e42ca085e825d0ffb76c704c3000ff123d93c5a7d8fe119fd929f3ce22b
java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el8_4.s390x.rpm
SHA-256: 7cf1bbc57317e0770c2dbb3b42dfd7385c2e2c1e8a6ce0a5064e56dc62bcea9b
java-1.8.0-openjdk-debuginfo-1.8.0.342.b07-1.el8_4.s390x.rpm
SHA-256: 530ee286c269def6ef7bf2af35dfe67fc420accc481a7b5c7a6a6d80369239ce
java-1.8.0-openjdk-debugsource-1.8.0.342.b07-1.el8_4.s390x.rpm
SHA-256: 9e019ca318c2947eb1a4a100fbeb5c73f247bd833d28dc74fed80dc5d23f5bb8
java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el8_4.s390x.rpm
SHA-256: 0a6ea6f920bbf47ef75fadc38ff043b876c09281e6828bb158dc726ca4cbd860
java-1.8.0-openjdk-demo-debuginfo-1.8.0.342.b07-1.el8_4.s390x.rpm
SHA-256: ad75a71bf3c33b3b7334b9dc86f4db0d1ea4b43e360ba05c0c9291e9694c45a7
java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el8_4.s390x.rpm
SHA-256: 2e683683383172b744f599d69cab7d7f3b0e1ad115e609c9fc87bf9751151ab4
java-1.8.0-openjdk-devel-debuginfo-1.8.0.342.b07-1.el8_4.s390x.rpm
SHA-256: 0adc9f8bd5ec21039dae4fbdcd446c3b7ca118e1060f3d2d200f11f97ad68d19
java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el8_4.s390x.rpm
SHA-256: b7ebced5acaa9e11ffa798e09d96d21fa3d438d1e2908827be8e372df928d26b
java-1.8.0-openjdk-headless-debuginfo-1.8.0.342.b07-1.el8_4.s390x.rpm
SHA-256: d9614e37efdceecde0b41c8897d01254d67628cb46cbec7057b181ab9e50f5fe
java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el8_4.noarch.rpm
SHA-256: 6e1d9567630259dc56705b5b1de3c22a018c3f6c4681c44cd5b90ab2713205b0
java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el8_4.noarch.rpm
SHA-256: 439f5b6a6449a5b0ec1cc7bc1560297defa42544a4099afe937e7cd1473ccb12
java-1.8.0-openjdk-src-1.8.0.342.b07-1.el8_4.s390x.rpm
SHA-256: 1405cc3e3d68ef361d104d74bac50396e059e773a49543d533f2eacf95af23ef
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4
SRPM
java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.src.rpm
SHA-256: bec7ea6c380b36f521765966a549daea3ef3c21eb5978cef753e285b992e7fbe
ppc64le
java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: a243e8757a20c0beaa76e2bcd78829b70bf07d27362646b404976ffeb1ea8608
java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: d8d5208675144dba249205f1d11a43529007d6c8a87689ca207e696203bc8464
java-1.8.0-openjdk-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: af45166872d5f99491e8bee465c470d4b5742db68f360655757b4626a18bee94
java-1.8.0-openjdk-debugsource-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: 954ed6dc74b55391d2350e33103c9efc46692c248350d126a5b9f3e96cf43bd4
java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: 6aac560ccc90ef8c040f0005eba9164cce330b5fb79028c4b8d83925d3f574a6
java-1.8.0-openjdk-demo-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: b2ce0270b6ee73fb96b897b8808e1dbfc94745b0285ae0cd39da098787593abf
java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: c0c11bd3af54031e1cab1c21ad75bd8a8e0ff8154c89415bd7e7c3d205edc426
java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: 09b185a1c41a92f4d9226a5dff003d863fd44880ea84d76a7dd207b07360754b
java-1.8.0-openjdk-devel-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: 78686b1f0a7f84ae05dc0b749c3e7f5557511a1f8a6f96f279337b60a2e11b50
java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: 320a802280258ce2beef991c8e48aaae7a2eadd45edfe46a7df18f8b03e2442b
java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: 0088f4469c4e7cadac7b8c642badf96404e0bae9be8085cfe92a2e35dcf1f958
java-1.8.0-openjdk-headless-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: cbf54ad658a11ad4db7222995fa47caea9a726a3c5baccd61b97256e4bfbc9b7
java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: e1ba2059999b2c679560e65ae955010ba6aea6b03cb8c5755671383033606d77
java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el8_4.noarch.rpm
SHA-256: 6e1d9567630259dc56705b5b1de3c22a018c3f6c4681c44cd5b90ab2713205b0
java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el8_4.noarch.rpm
SHA-256: 439f5b6a6449a5b0ec1cc7bc1560297defa42544a4099afe937e7cd1473ccb12
java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: 633af463d72a206da5d6cff17c60590b5112789b35074803971152d31847167c
java-1.8.0-openjdk-src-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: 9e60d63bb48353a591c1fd6da7eb8cd344654225c072326574ca34a69f685f15
Red Hat Enterprise Linux Server - TUS 8.4
SRPM
java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.src.rpm
SHA-256: bec7ea6c380b36f521765966a549daea3ef3c21eb5978cef753e285b992e7fbe
x86_64
java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: bdf5a6b9cd2c12b200237da84532e04258c58b613e855b298ed400dbf7d5cf5d
java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 3b9a0695d3df1e5ccd125892178d12dc1d0ec6397d82b8cd1f5abb2d9f05acae
java-1.8.0-openjdk-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: a6775c2372040dc2df57172ead47b3c641955ecb6a80841abc22b981ab7b2524
java-1.8.0-openjdk-debugsource-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 6e8e40b18b1c36598aa209901395eba9a74b3bff5d465ad05ba867135d3fa037
java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 34c48bd0a881b03724befea9db1f3e26a35a2edf4a59e4c87175ecf354bcf1a1
java-1.8.0-openjdk-demo-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: abac86b0e8cc2173dccddf3028597412dd274beeba12a737a5c30797047ff98e
java-1.8.0-openjdk-demo-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: c052d31d0bc79864d6e09b496db5656c952dc7496a0f0f5642aa097a3b6906cf
java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: d4b68c70c5c0ac4567d80824ae19b74a02d6f3cd420a09d065523c060f0d8580
java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: b359f140445ea92989b298f4a4eb23c7c0d3e6efb9e9066f0a8a4aaf0d1423ec
java-1.8.0-openjdk-devel-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 22ab032aaecb2745306c368ca8d9b71dd48e3c0d8c78803c008e379ce7b029e4
java-1.8.0-openjdk-devel-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: d8a464b5fda29671820e38f5d79a7017c914f4296feeda67e7b78877567b3805
java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 936ce83fd3786af9a9e9e76e75c5a9df50d99dd3ec33c496f66e1a7b8bc366ca
java-1.8.0-openjdk-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 3cf6bc23cde23f7489abde021c232b9b98249275e7f67b7586d61a807d6c6f56
java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 8d443fd45534241d50dbbbaae7c1307038b482f1a2776480570aa3f5c86ed005
java-1.8.0-openjdk-headless-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 9ddd4538b4d01d3aaee18401832ecc6bf685a061a8df412ea8391136a47cea46
java-1.8.0-openjdk-headless-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 39c1400fd1c21c5d793d2e1a54290a16cd0845fb4db94e0c60ea835a6b0316d9
java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 3c01c74fdef5447bd3ba511b4cffcc163d3ac67506638e86bdf246188e6b633c
java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el8_4.noarch.rpm
SHA-256: 6e1d9567630259dc56705b5b1de3c22a018c3f6c4681c44cd5b90ab2713205b0
java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el8_4.noarch.rpm
SHA-256: 439f5b6a6449a5b0ec1cc7bc1560297defa42544a4099afe937e7cd1473ccb12
java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: acbd61ffe943e8899b97d415ed9c89f066add57ec5d654729eebdd694c683914
java-1.8.0-openjdk-src-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: ad8eb59dfbb88f898326461ee0ed7a48159c613db9c9213ee3a86faf0e0dd291
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4
SRPM
java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.src.rpm
SHA-256: bec7ea6c380b36f521765966a549daea3ef3c21eb5978cef753e285b992e7fbe
aarch64
java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: 45930d454a0dd50f432f642fa63364e755f0d7e8f5cf0f411d8eae55cd380f54
java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: 1d5b5bc8c01f2517be9ec30377a92ebd72be0bb3d08126c5172fc36fc0a0f7fc
java-1.8.0-openjdk-debuginfo-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: dac5ebd215b5fed87c208c4796324100c9fbacfc4bd7de2457969c2f9eaaafc9
java-1.8.0-openjdk-debugsource-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: 5c2b3e3ee068f01096b71713aad87275d37af268c8e5487d257bc6ea7db53c71
java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: 367af65df0a589a5e278d8e9a1dc21476ec199ec2efdba2a56294b746aa19770
java-1.8.0-openjdk-demo-debuginfo-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: 0d2200cd5dfd4c80429e56c1899a46f9ef01ea4033d8ac9d898e7ecb1851cea7
java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: fe8c1ad0c2a595832f18760ae163b30b003a2be94a330c210c995ef88d446c7b
java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: 1ae10241b16dee6669c14c5404bd87576665542eabcaa706a00b5655d5d8be9f
java-1.8.0-openjdk-devel-debuginfo-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: 43199e3e81708223eb8cc92853059e5a502354c8e188bef4be60327076667ffc
java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: a4f61006b4d9e5f7596679d88a5c3d0206806f425b5c3ff0a4573eed65bd4638
java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: 5557ddc19f8a1e21ee675712fee5ee4b5df3567e51e13047e3c661cf86795749
java-1.8.0-openjdk-headless-debuginfo-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: c4a951ba84839d78f2996d8f18f5c2eda5b2628e1d5788bdab214e218876bdf3
java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: 098ae3475282f6c05a6c40fd1f82712fc87ca1bbf04b49b70f48ffb4455d89ba
java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el8_4.noarch.rpm
SHA-256: 6e1d9567630259dc56705b5b1de3c22a018c3f6c4681c44cd5b90ab2713205b0
java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el8_4.noarch.rpm
SHA-256: 439f5b6a6449a5b0ec1cc7bc1560297defa42544a4099afe937e7cd1473ccb12
java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: e0681a5ead6dfc7fffa19ac992c4b8f0c36a23d655fa0dfc136bf88792962ec4
java-1.8.0-openjdk-src-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: 536fa51e5fbcb4b2a0fdb65c9b6970bd24b4042471db2b6c4408aa23aa62a4c5
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4
SRPM
java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.src.rpm
SHA-256: bec7ea6c380b36f521765966a549daea3ef3c21eb5978cef753e285b992e7fbe
ppc64le
java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: a243e8757a20c0beaa76e2bcd78829b70bf07d27362646b404976ffeb1ea8608
java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: d8d5208675144dba249205f1d11a43529007d6c8a87689ca207e696203bc8464
java-1.8.0-openjdk-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: af45166872d5f99491e8bee465c470d4b5742db68f360655757b4626a18bee94
java-1.8.0-openjdk-debugsource-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: 954ed6dc74b55391d2350e33103c9efc46692c248350d126a5b9f3e96cf43bd4
java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: 6aac560ccc90ef8c040f0005eba9164cce330b5fb79028c4b8d83925d3f574a6
java-1.8.0-openjdk-demo-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: b2ce0270b6ee73fb96b897b8808e1dbfc94745b0285ae0cd39da098787593abf
java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: c0c11bd3af54031e1cab1c21ad75bd8a8e0ff8154c89415bd7e7c3d205edc426
java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: 09b185a1c41a92f4d9226a5dff003d863fd44880ea84d76a7dd207b07360754b
java-1.8.0-openjdk-devel-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: 78686b1f0a7f84ae05dc0b749c3e7f5557511a1f8a6f96f279337b60a2e11b50
java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: 320a802280258ce2beef991c8e48aaae7a2eadd45edfe46a7df18f8b03e2442b
java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: 0088f4469c4e7cadac7b8c642badf96404e0bae9be8085cfe92a2e35dcf1f958
java-1.8.0-openjdk-headless-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: cbf54ad658a11ad4db7222995fa47caea9a726a3c5baccd61b97256e4bfbc9b7
java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: e1ba2059999b2c679560e65ae955010ba6aea6b03cb8c5755671383033606d77
java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el8_4.noarch.rpm
SHA-256: 6e1d9567630259dc56705b5b1de3c22a018c3f6c4681c44cd5b90ab2713205b0
java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el8_4.noarch.rpm
SHA-256: 439f5b6a6449a5b0ec1cc7bc1560297defa42544a4099afe937e7cd1473ccb12
java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: 633af463d72a206da5d6cff17c60590b5112789b35074803971152d31847167c
java-1.8.0-openjdk-src-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: 9e60d63bb48353a591c1fd6da7eb8cd344654225c072326574ca34a69f685f15
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4
SRPM
java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.src.rpm
SHA-256: bec7ea6c380b36f521765966a549daea3ef3c21eb5978cef753e285b992e7fbe
x86_64
java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: bdf5a6b9cd2c12b200237da84532e04258c58b613e855b298ed400dbf7d5cf5d
java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 3b9a0695d3df1e5ccd125892178d12dc1d0ec6397d82b8cd1f5abb2d9f05acae
java-1.8.0-openjdk-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: a6775c2372040dc2df57172ead47b3c641955ecb6a80841abc22b981ab7b2524
java-1.8.0-openjdk-debugsource-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 6e8e40b18b1c36598aa209901395eba9a74b3bff5d465ad05ba867135d3fa037
java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 34c48bd0a881b03724befea9db1f3e26a35a2edf4a59e4c87175ecf354bcf1a1
java-1.8.0-openjdk-demo-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: abac86b0e8cc2173dccddf3028597412dd274beeba12a737a5c30797047ff98e
java-1.8.0-openjdk-demo-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: c052d31d0bc79864d6e09b496db5656c952dc7496a0f0f5642aa097a3b6906cf
java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: d4b68c70c5c0ac4567d80824ae19b74a02d6f3cd420a09d065523c060f0d8580
java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: b359f140445ea92989b298f4a4eb23c7c0d3e6efb9e9066f0a8a4aaf0d1423ec
java-1.8.0-openjdk-devel-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 22ab032aaecb2745306c368ca8d9b71dd48e3c0d8c78803c008e379ce7b029e4
java-1.8.0-openjdk-devel-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: d8a464b5fda29671820e38f5d79a7017c914f4296feeda67e7b78877567b3805
java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 936ce83fd3786af9a9e9e76e75c5a9df50d99dd3ec33c496f66e1a7b8bc366ca
java-1.8.0-openjdk-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 3cf6bc23cde23f7489abde021c232b9b98249275e7f67b7586d61a807d6c6f56
java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 8d443fd45534241d50dbbbaae7c1307038b482f1a2776480570aa3f5c86ed005
java-1.8.0-openjdk-headless-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 9ddd4538b4d01d3aaee18401832ecc6bf685a061a8df412ea8391136a47cea46
java-1.8.0-openjdk-headless-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 39c1400fd1c21c5d793d2e1a54290a16cd0845fb4db94e0c60ea835a6b0316d9
java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 3c01c74fdef5447bd3ba511b4cffcc163d3ac67506638e86bdf246188e6b633c
java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el8_4.noarch.rpm
SHA-256: 6e1d9567630259dc56705b5b1de3c22a018c3f6c4681c44cd5b90ab2713205b0
java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el8_4.noarch.rpm
SHA-256: 439f5b6a6449a5b0ec1cc7bc1560297defa42544a4099afe937e7cd1473ccb12
java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: acbd61ffe943e8899b97d415ed9c89f066add57ec5d654729eebdd694c683914
java-1.8.0-openjdk-src-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: ad8eb59dfbb88f898326461ee0ed7a48159c613db9c9213ee3a86faf0e0dd291
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4
SRPM
x86_64
java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 34e83b0e6360b96fc3cd577fd9873c076f0e9cf3143aefd7a65df9970fce40e3
java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 97c02bb051c5c91b1abf7cfcb10504b6ef62ce38799f20be94bff27a5f7c67ed
java-1.8.0-openjdk-debugsource-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 6e8e40b18b1c36598aa209901395eba9a74b3bff5d465ad05ba867135d3fa037
java-1.8.0-openjdk-demo-fastdebug-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: d82febc14624b47e9edad52b22e9abbf64935ede3935051ed0a55da2d0e98c8f
java-1.8.0-openjdk-demo-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: c052d31d0bc79864d6e09b496db5656c952dc7496a0f0f5642aa097a3b6906cf
java-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 4e8cb9e22ee30dc80f085a04a376c22826bcde6279fd07f130085792042c0307
java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: d4b68c70c5c0ac4567d80824ae19b74a02d6f3cd420a09d065523c060f0d8580
java-1.8.0-openjdk-devel-fastdebug-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: fdbe4472a1fd3e24674121aba7f0679520b36878b01b789664afb8e20a22230c
java-1.8.0-openjdk-devel-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: d8a464b5fda29671820e38f5d79a7017c914f4296feeda67e7b78877567b3805
java-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 2f921d42940359f2a43db65aeaee79879535bff00df88b62cde2605f8ac39f9e
java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 936ce83fd3786af9a9e9e76e75c5a9df50d99dd3ec33c496f66e1a7b8bc366ca
java-1.8.0-openjdk-fastdebug-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: b9020a4b5a4eb92535b16df2fff85c5f9c8351270a14651a553256a8083a4cea
java-1.8.0-openjdk-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 3cf6bc23cde23f7489abde021c232b9b98249275e7f67b7586d61a807d6c6f56
java-1.8.0-openjdk-headless-fastdebug-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 8aff63268f3c0c5221ce237bd25ebda225681aed1caaa6c73dcd09d2ca36b928
java-1.8.0-openjdk-headless-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 39c1400fd1c21c5d793d2e1a54290a16cd0845fb4db94e0c60ea835a6b0316d9
java-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 6f631035dfa1d91af1cf25f9ea78a3654c08bb9a443a19c37361551462d39bbd
java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 3c01c74fdef5447bd3ba511b4cffcc163d3ac67506638e86bdf246188e6b633c
java-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 5916f4ea46d61aa6c3b668255019ded54f9676b7d5301746e3247d244f3ea628
java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: acbd61ffe943e8899b97d415ed9c89f066add57ec5d654729eebdd694c683914
java-1.8.0-openjdk-src-fastdebug-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: b413282095485d70cf801337f7f07a0b3fce6b325900a032385b6a1caf436734
java-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el8_4.x86_64.rpm
SHA-256: 58c7fc8f65d6d5ee1be560cfc414fe78ea54cd15eb68f12e30150b07950e5f2c
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4
SRPM
ppc64le
java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: 12e2fe49c1f8cc4029137f18b6bcb03d8ae663087c7d8dc6f87733fe67d77f19
java-1.8.0-openjdk-debugsource-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: 954ed6dc74b55391d2350e33103c9efc46692c248350d126a5b9f3e96cf43bd4
java-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: da200e1f0d145cf2f2e45d976cd84fe0837da566d6a46d48f8df3dfe92d5788a
java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: c0c11bd3af54031e1cab1c21ad75bd8a8e0ff8154c89415bd7e7c3d205edc426
java-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: 98a7218e3bf47734be2d65fa8f6c8291b27b0430e69ccdba62c89d353a0b7898
java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: 320a802280258ce2beef991c8e48aaae7a2eadd45edfe46a7df18f8b03e2442b
java-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: aea87839380cf033fcbfa083097f562357d1d4aa516fc8fd6bcf54876c77de54
java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: e1ba2059999b2c679560e65ae955010ba6aea6b03cb8c5755671383033606d77
java-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: f55498aa3c762d86c01616e066a5ca8e874777b26c74e56a392d1a5f298e08ab
java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: 633af463d72a206da5d6cff17c60590b5112789b35074803971152d31847167c
java-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el8_4.ppc64le.rpm
SHA-256: 2b0943b916e6dbccd34ac8136d8a7141d1d2d098ec080c3fdf1cfa5b08eade2b
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4
SRPM
aarch64
java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: cdbe99922cd401dedc89a11b695bd2be23ab9d1f6db325ae4a3dba3e9c1c926c
java-1.8.0-openjdk-debugsource-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: 5c2b3e3ee068f01096b71713aad87275d37af268c8e5487d257bc6ea7db53c71
java-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: 40f711ca4d1c5a5470620a508c633fd7035cfbb087bd812dbd9127a519318f03
java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: fe8c1ad0c2a595832f18760ae163b30b003a2be94a330c210c995ef88d446c7b
java-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: d8b55cc9cea00b1e6bd8156fbe394992efb879b7a76c1f3ae7c94332ebbab459
java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: a4f61006b4d9e5f7596679d88a5c3d0206806f425b5c3ff0a4573eed65bd4638
java-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: c04927ef028de4256f136a8c0e1828385860c5daf4955a22adcf351d14fdf669
java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: 098ae3475282f6c05a6c40fd1f82712fc87ca1bbf04b49b70f48ffb4455d89ba
java-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: dd389d42fa130c6a242ba9243ff3171639e7cdc3eba9509a8c826da6f3f8758a
java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: e0681a5ead6dfc7fffa19ac992c4b8f0c36a23d655fa0dfc136bf88792962ec4
java-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el8_4.aarch64.rpm
SHA-256: 0e8d77d979948b91bae85e606c394fd12a3704bffe94bf470d10793468ca6d45
Related news
Red Hat Security Advisory 2024-3708-03 - Red Hat build of Apache Camel 3.20.6 for Spring Boot release and security update is now available. Issues addressed include denial of service and server-side request forgery vulnerabilities.
Progress Chef Infra Server before 15.7 allows a local attacker to exploit a /var/opt/opscode/local-mode-cache/backup world-readable temporary backup path to access sensitive information, resulting in the disclosure of all indexed node data, because OpenSearch credentials are exposed. (The data typically includes credentials for additional systems.) The attacker must wait for an admin to run the "chef-server-ctl reconfigure" command.
Previous versions of HP Device Manager (prior to HPDM 5.0.10) could potentially allow command injection and/or elevation of privileges.
Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.
IBM Cloud Transformation Advisor 2.0.1 through 3.3.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 237214.
Red Hat Security Advisory 2022-6262-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.6.61. Issues addressed include a bypass vulnerability.
Red Hat OpenShift Container Platform release 3.11.784 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 3.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-39226: grafana: Snapshot authentication bypass
Red Hat Security Advisory 2022-6053-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.56.
Red Hat OpenShift Container Platform release 4.9.45 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2403: openshift: oauth-serving-cert configmap contains cluster certificate private key
Openshift Logging Bug Fix Release (5.2.13) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS
Openshift Logging Bug Fix Release (5.3.10) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS
Red Hat Security Advisory 2022-5756-01 - The OpenJDK 11 packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. This release of the Red Hat build of OpenJDK 11 for Windows serves as a replacement for the Red Hat build of OpenJDK 11 and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.
Red Hat Security Advisory 2022-5753-01 - The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. This release of the Red Hat build of OpenJDK 8 for Windows serves as a replacement for the Red Hat build of OpenJDK 8 and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.
The Red Hat build of OpenJDK 17 (java-17-openjdk) is now available for Windows. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-21549: OpenJDK: random exponentials issue (Libraries, 8283875) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
The Red Hat Build of OpenJDK 11 (java-11-openjdk) is now available for Windows. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
The Red Hat build of OpenJDK 8 (java-1.8.0-openjdk) is now available for portable Linux. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
The Red Hat build of OpenJDK 8 (java-1.8.0-openjdk) is now available for Windows. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
Red Hat Security Advisory 2022-5681-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Red Hat Security Advisory 2022-5709-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Red Hat Security Advisory 2022-5685-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
An update for java-17-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-21549: OpenJDK: random exponentials issue (Libraries, 8283875) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. The Apache Xalan Java project is dormant and in the process of being retired. No future releases of Apache Xalan Java to address this issue are expected. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.
Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Trade Finance accessible data as well as unauthorized access to critical data or complete access to all Oracle Banking Trade Finance accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N).
Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Trade Finance accessible data as well as unauthorized access to critical data or complete access to all Oracle Banking Trade Finance accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N).
Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Trade Finance accessible data as well as unauthorized access to critical data or complete access to all Oracle Banking Trade Finance accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N).
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. The Apache Xalan Java project is dormant and in the process of being retired. No future releases of Apache Xalan Java to address this issue are expected. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.