Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:5697: Red Hat Security Advisory: java-1.8.0-openjdk security and bug fix update

An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859)
  • CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)
  • CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
Red Hat Security Data
#vulnerability#linux#red_hat#java#ibm#sap

Synopsis

Important: java-1.8.0-openjdk security and bug fix update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

  • OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)
  • OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
  • OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-8, openjdk-8] (BZ#2099912)
  • Revert to disabling system security properties and FIPS mode support together [rhel-8, openjdk-8] (BZ#2108565)
  • SecretKey generate/import operations don’t add the CKA_SIGN attribute in FIPS mode [rhel-8, openjdk-8] (BZ#2108567)
  • Detect NSS at Runtime for FIPS detection [rhel-8, openjdk-11] (BZ#2108667)

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

All running instances of OpenJDK Java must be restarted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 8.4 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
  • Red Hat Enterprise Linux Server - TUS 8.4 x86_64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
  • Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4 x86_64
  • Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4 ppc64le
  • Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4 aarch64

Fixes

  • BZ - 2099912 - rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-8, openjdk-8] [rhel-8.4.0.z]
  • BZ - 2108540 - CVE-2022-21540 OpenJDK: class compilation issue (Hotspot, 8281859)
  • BZ - 2108543 - CVE-2022-21541 OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866)
  • BZ - 2108554 - CVE-2022-34169 OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)
  • BZ - 2108565 - Revert to disabling system security properties and FIPS mode support together [rhel-8, openjdk-8] [rhel-8.4.0.z]
  • BZ - 2108567 - SecretKey generate/import operations don’t add the CKA_SIGN attribute in FIPS mode [rhel-8, openjdk-8] [rhel-8.4.0.z]
  • BZ - 2108667 - Detect NSS at Runtime for FIPS detection [rhel-8, openjdk-11] [rhel-8.4.0.z]

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4

SRPM

java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.src.rpm

SHA-256: bec7ea6c380b36f521765966a549daea3ef3c21eb5978cef753e285b992e7fbe

x86_64

java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: bdf5a6b9cd2c12b200237da84532e04258c58b613e855b298ed400dbf7d5cf5d

java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 3b9a0695d3df1e5ccd125892178d12dc1d0ec6397d82b8cd1f5abb2d9f05acae

java-1.8.0-openjdk-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: a6775c2372040dc2df57172ead47b3c641955ecb6a80841abc22b981ab7b2524

java-1.8.0-openjdk-debugsource-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 6e8e40b18b1c36598aa209901395eba9a74b3bff5d465ad05ba867135d3fa037

java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 34c48bd0a881b03724befea9db1f3e26a35a2edf4a59e4c87175ecf354bcf1a1

java-1.8.0-openjdk-demo-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: abac86b0e8cc2173dccddf3028597412dd274beeba12a737a5c30797047ff98e

java-1.8.0-openjdk-demo-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: c052d31d0bc79864d6e09b496db5656c952dc7496a0f0f5642aa097a3b6906cf

java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: d4b68c70c5c0ac4567d80824ae19b74a02d6f3cd420a09d065523c060f0d8580

java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: b359f140445ea92989b298f4a4eb23c7c0d3e6efb9e9066f0a8a4aaf0d1423ec

java-1.8.0-openjdk-devel-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 22ab032aaecb2745306c368ca8d9b71dd48e3c0d8c78803c008e379ce7b029e4

java-1.8.0-openjdk-devel-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: d8a464b5fda29671820e38f5d79a7017c914f4296feeda67e7b78877567b3805

java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 936ce83fd3786af9a9e9e76e75c5a9df50d99dd3ec33c496f66e1a7b8bc366ca

java-1.8.0-openjdk-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 3cf6bc23cde23f7489abde021c232b9b98249275e7f67b7586d61a807d6c6f56

java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 8d443fd45534241d50dbbbaae7c1307038b482f1a2776480570aa3f5c86ed005

java-1.8.0-openjdk-headless-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 9ddd4538b4d01d3aaee18401832ecc6bf685a061a8df412ea8391136a47cea46

java-1.8.0-openjdk-headless-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 39c1400fd1c21c5d793d2e1a54290a16cd0845fb4db94e0c60ea835a6b0316d9

java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 3c01c74fdef5447bd3ba511b4cffcc163d3ac67506638e86bdf246188e6b633c

java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el8_4.noarch.rpm

SHA-256: 6e1d9567630259dc56705b5b1de3c22a018c3f6c4681c44cd5b90ab2713205b0

java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el8_4.noarch.rpm

SHA-256: 439f5b6a6449a5b0ec1cc7bc1560297defa42544a4099afe937e7cd1473ccb12

java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: acbd61ffe943e8899b97d415ed9c89f066add57ec5d654729eebdd694c683914

java-1.8.0-openjdk-src-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: ad8eb59dfbb88f898326461ee0ed7a48159c613db9c9213ee3a86faf0e0dd291

Red Hat Enterprise Linux Server - AUS 8.4

SRPM

java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.src.rpm

SHA-256: bec7ea6c380b36f521765966a549daea3ef3c21eb5978cef753e285b992e7fbe

x86_64

java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: bdf5a6b9cd2c12b200237da84532e04258c58b613e855b298ed400dbf7d5cf5d

java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 3b9a0695d3df1e5ccd125892178d12dc1d0ec6397d82b8cd1f5abb2d9f05acae

java-1.8.0-openjdk-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: a6775c2372040dc2df57172ead47b3c641955ecb6a80841abc22b981ab7b2524

java-1.8.0-openjdk-debugsource-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 6e8e40b18b1c36598aa209901395eba9a74b3bff5d465ad05ba867135d3fa037

java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 34c48bd0a881b03724befea9db1f3e26a35a2edf4a59e4c87175ecf354bcf1a1

java-1.8.0-openjdk-demo-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: abac86b0e8cc2173dccddf3028597412dd274beeba12a737a5c30797047ff98e

java-1.8.0-openjdk-demo-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: c052d31d0bc79864d6e09b496db5656c952dc7496a0f0f5642aa097a3b6906cf

java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: d4b68c70c5c0ac4567d80824ae19b74a02d6f3cd420a09d065523c060f0d8580

java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: b359f140445ea92989b298f4a4eb23c7c0d3e6efb9e9066f0a8a4aaf0d1423ec

java-1.8.0-openjdk-devel-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 22ab032aaecb2745306c368ca8d9b71dd48e3c0d8c78803c008e379ce7b029e4

java-1.8.0-openjdk-devel-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: d8a464b5fda29671820e38f5d79a7017c914f4296feeda67e7b78877567b3805

java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 936ce83fd3786af9a9e9e76e75c5a9df50d99dd3ec33c496f66e1a7b8bc366ca

java-1.8.0-openjdk-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 3cf6bc23cde23f7489abde021c232b9b98249275e7f67b7586d61a807d6c6f56

java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 8d443fd45534241d50dbbbaae7c1307038b482f1a2776480570aa3f5c86ed005

java-1.8.0-openjdk-headless-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 9ddd4538b4d01d3aaee18401832ecc6bf685a061a8df412ea8391136a47cea46

java-1.8.0-openjdk-headless-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 39c1400fd1c21c5d793d2e1a54290a16cd0845fb4db94e0c60ea835a6b0316d9

java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 3c01c74fdef5447bd3ba511b4cffcc163d3ac67506638e86bdf246188e6b633c

java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el8_4.noarch.rpm

SHA-256: 6e1d9567630259dc56705b5b1de3c22a018c3f6c4681c44cd5b90ab2713205b0

java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el8_4.noarch.rpm

SHA-256: 439f5b6a6449a5b0ec1cc7bc1560297defa42544a4099afe937e7cd1473ccb12

java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: acbd61ffe943e8899b97d415ed9c89f066add57ec5d654729eebdd694c683914

java-1.8.0-openjdk-src-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: ad8eb59dfbb88f898326461ee0ed7a48159c613db9c9213ee3a86faf0e0dd291

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4

SRPM

java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.src.rpm

SHA-256: bec7ea6c380b36f521765966a549daea3ef3c21eb5978cef753e285b992e7fbe

s390x

java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.s390x.rpm

SHA-256: 775e5e42ca085e825d0ffb76c704c3000ff123d93c5a7d8fe119fd929f3ce22b

java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el8_4.s390x.rpm

SHA-256: 7cf1bbc57317e0770c2dbb3b42dfd7385c2e2c1e8a6ce0a5064e56dc62bcea9b

java-1.8.0-openjdk-debuginfo-1.8.0.342.b07-1.el8_4.s390x.rpm

SHA-256: 530ee286c269def6ef7bf2af35dfe67fc420accc481a7b5c7a6a6d80369239ce

java-1.8.0-openjdk-debugsource-1.8.0.342.b07-1.el8_4.s390x.rpm

SHA-256: 9e019ca318c2947eb1a4a100fbeb5c73f247bd833d28dc74fed80dc5d23f5bb8

java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el8_4.s390x.rpm

SHA-256: 0a6ea6f920bbf47ef75fadc38ff043b876c09281e6828bb158dc726ca4cbd860

java-1.8.0-openjdk-demo-debuginfo-1.8.0.342.b07-1.el8_4.s390x.rpm

SHA-256: ad75a71bf3c33b3b7334b9dc86f4db0d1ea4b43e360ba05c0c9291e9694c45a7

java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el8_4.s390x.rpm

SHA-256: 2e683683383172b744f599d69cab7d7f3b0e1ad115e609c9fc87bf9751151ab4

java-1.8.0-openjdk-devel-debuginfo-1.8.0.342.b07-1.el8_4.s390x.rpm

SHA-256: 0adc9f8bd5ec21039dae4fbdcd446c3b7ca118e1060f3d2d200f11f97ad68d19

java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el8_4.s390x.rpm

SHA-256: b7ebced5acaa9e11ffa798e09d96d21fa3d438d1e2908827be8e372df928d26b

java-1.8.0-openjdk-headless-debuginfo-1.8.0.342.b07-1.el8_4.s390x.rpm

SHA-256: d9614e37efdceecde0b41c8897d01254d67628cb46cbec7057b181ab9e50f5fe

java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el8_4.noarch.rpm

SHA-256: 6e1d9567630259dc56705b5b1de3c22a018c3f6c4681c44cd5b90ab2713205b0

java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el8_4.noarch.rpm

SHA-256: 439f5b6a6449a5b0ec1cc7bc1560297defa42544a4099afe937e7cd1473ccb12

java-1.8.0-openjdk-src-1.8.0.342.b07-1.el8_4.s390x.rpm

SHA-256: 1405cc3e3d68ef361d104d74bac50396e059e773a49543d533f2eacf95af23ef

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4

SRPM

java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.src.rpm

SHA-256: bec7ea6c380b36f521765966a549daea3ef3c21eb5978cef753e285b992e7fbe

ppc64le

java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: a243e8757a20c0beaa76e2bcd78829b70bf07d27362646b404976ffeb1ea8608

java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: d8d5208675144dba249205f1d11a43529007d6c8a87689ca207e696203bc8464

java-1.8.0-openjdk-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: af45166872d5f99491e8bee465c470d4b5742db68f360655757b4626a18bee94

java-1.8.0-openjdk-debugsource-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: 954ed6dc74b55391d2350e33103c9efc46692c248350d126a5b9f3e96cf43bd4

java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: 6aac560ccc90ef8c040f0005eba9164cce330b5fb79028c4b8d83925d3f574a6

java-1.8.0-openjdk-demo-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: b2ce0270b6ee73fb96b897b8808e1dbfc94745b0285ae0cd39da098787593abf

java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: c0c11bd3af54031e1cab1c21ad75bd8a8e0ff8154c89415bd7e7c3d205edc426

java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: 09b185a1c41a92f4d9226a5dff003d863fd44880ea84d76a7dd207b07360754b

java-1.8.0-openjdk-devel-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: 78686b1f0a7f84ae05dc0b749c3e7f5557511a1f8a6f96f279337b60a2e11b50

java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: 320a802280258ce2beef991c8e48aaae7a2eadd45edfe46a7df18f8b03e2442b

java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: 0088f4469c4e7cadac7b8c642badf96404e0bae9be8085cfe92a2e35dcf1f958

java-1.8.0-openjdk-headless-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: cbf54ad658a11ad4db7222995fa47caea9a726a3c5baccd61b97256e4bfbc9b7

java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: e1ba2059999b2c679560e65ae955010ba6aea6b03cb8c5755671383033606d77

java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el8_4.noarch.rpm

SHA-256: 6e1d9567630259dc56705b5b1de3c22a018c3f6c4681c44cd5b90ab2713205b0

java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el8_4.noarch.rpm

SHA-256: 439f5b6a6449a5b0ec1cc7bc1560297defa42544a4099afe937e7cd1473ccb12

java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: 633af463d72a206da5d6cff17c60590b5112789b35074803971152d31847167c

java-1.8.0-openjdk-src-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: 9e60d63bb48353a591c1fd6da7eb8cd344654225c072326574ca34a69f685f15

Red Hat Enterprise Linux Server - TUS 8.4

SRPM

java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.src.rpm

SHA-256: bec7ea6c380b36f521765966a549daea3ef3c21eb5978cef753e285b992e7fbe

x86_64

java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: bdf5a6b9cd2c12b200237da84532e04258c58b613e855b298ed400dbf7d5cf5d

java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 3b9a0695d3df1e5ccd125892178d12dc1d0ec6397d82b8cd1f5abb2d9f05acae

java-1.8.0-openjdk-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: a6775c2372040dc2df57172ead47b3c641955ecb6a80841abc22b981ab7b2524

java-1.8.0-openjdk-debugsource-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 6e8e40b18b1c36598aa209901395eba9a74b3bff5d465ad05ba867135d3fa037

java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 34c48bd0a881b03724befea9db1f3e26a35a2edf4a59e4c87175ecf354bcf1a1

java-1.8.0-openjdk-demo-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: abac86b0e8cc2173dccddf3028597412dd274beeba12a737a5c30797047ff98e

java-1.8.0-openjdk-demo-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: c052d31d0bc79864d6e09b496db5656c952dc7496a0f0f5642aa097a3b6906cf

java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: d4b68c70c5c0ac4567d80824ae19b74a02d6f3cd420a09d065523c060f0d8580

java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: b359f140445ea92989b298f4a4eb23c7c0d3e6efb9e9066f0a8a4aaf0d1423ec

java-1.8.0-openjdk-devel-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 22ab032aaecb2745306c368ca8d9b71dd48e3c0d8c78803c008e379ce7b029e4

java-1.8.0-openjdk-devel-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: d8a464b5fda29671820e38f5d79a7017c914f4296feeda67e7b78877567b3805

java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 936ce83fd3786af9a9e9e76e75c5a9df50d99dd3ec33c496f66e1a7b8bc366ca

java-1.8.0-openjdk-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 3cf6bc23cde23f7489abde021c232b9b98249275e7f67b7586d61a807d6c6f56

java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 8d443fd45534241d50dbbbaae7c1307038b482f1a2776480570aa3f5c86ed005

java-1.8.0-openjdk-headless-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 9ddd4538b4d01d3aaee18401832ecc6bf685a061a8df412ea8391136a47cea46

java-1.8.0-openjdk-headless-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 39c1400fd1c21c5d793d2e1a54290a16cd0845fb4db94e0c60ea835a6b0316d9

java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 3c01c74fdef5447bd3ba511b4cffcc163d3ac67506638e86bdf246188e6b633c

java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el8_4.noarch.rpm

SHA-256: 6e1d9567630259dc56705b5b1de3c22a018c3f6c4681c44cd5b90ab2713205b0

java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el8_4.noarch.rpm

SHA-256: 439f5b6a6449a5b0ec1cc7bc1560297defa42544a4099afe937e7cd1473ccb12

java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: acbd61ffe943e8899b97d415ed9c89f066add57ec5d654729eebdd694c683914

java-1.8.0-openjdk-src-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: ad8eb59dfbb88f898326461ee0ed7a48159c613db9c9213ee3a86faf0e0dd291

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4

SRPM

java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.src.rpm

SHA-256: bec7ea6c380b36f521765966a549daea3ef3c21eb5978cef753e285b992e7fbe

aarch64

java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: 45930d454a0dd50f432f642fa63364e755f0d7e8f5cf0f411d8eae55cd380f54

java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: 1d5b5bc8c01f2517be9ec30377a92ebd72be0bb3d08126c5172fc36fc0a0f7fc

java-1.8.0-openjdk-debuginfo-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: dac5ebd215b5fed87c208c4796324100c9fbacfc4bd7de2457969c2f9eaaafc9

java-1.8.0-openjdk-debugsource-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: 5c2b3e3ee068f01096b71713aad87275d37af268c8e5487d257bc6ea7db53c71

java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: 367af65df0a589a5e278d8e9a1dc21476ec199ec2efdba2a56294b746aa19770

java-1.8.0-openjdk-demo-debuginfo-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: 0d2200cd5dfd4c80429e56c1899a46f9ef01ea4033d8ac9d898e7ecb1851cea7

java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: fe8c1ad0c2a595832f18760ae163b30b003a2be94a330c210c995ef88d446c7b

java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: 1ae10241b16dee6669c14c5404bd87576665542eabcaa706a00b5655d5d8be9f

java-1.8.0-openjdk-devel-debuginfo-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: 43199e3e81708223eb8cc92853059e5a502354c8e188bef4be60327076667ffc

java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: a4f61006b4d9e5f7596679d88a5c3d0206806f425b5c3ff0a4573eed65bd4638

java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: 5557ddc19f8a1e21ee675712fee5ee4b5df3567e51e13047e3c661cf86795749

java-1.8.0-openjdk-headless-debuginfo-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: c4a951ba84839d78f2996d8f18f5c2eda5b2628e1d5788bdab214e218876bdf3

java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: 098ae3475282f6c05a6c40fd1f82712fc87ca1bbf04b49b70f48ffb4455d89ba

java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el8_4.noarch.rpm

SHA-256: 6e1d9567630259dc56705b5b1de3c22a018c3f6c4681c44cd5b90ab2713205b0

java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el8_4.noarch.rpm

SHA-256: 439f5b6a6449a5b0ec1cc7bc1560297defa42544a4099afe937e7cd1473ccb12

java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: e0681a5ead6dfc7fffa19ac992c4b8f0c36a23d655fa0dfc136bf88792962ec4

java-1.8.0-openjdk-src-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: 536fa51e5fbcb4b2a0fdb65c9b6970bd24b4042471db2b6c4408aa23aa62a4c5

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4

SRPM

java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.src.rpm

SHA-256: bec7ea6c380b36f521765966a549daea3ef3c21eb5978cef753e285b992e7fbe

ppc64le

java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: a243e8757a20c0beaa76e2bcd78829b70bf07d27362646b404976ffeb1ea8608

java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: d8d5208675144dba249205f1d11a43529007d6c8a87689ca207e696203bc8464

java-1.8.0-openjdk-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: af45166872d5f99491e8bee465c470d4b5742db68f360655757b4626a18bee94

java-1.8.0-openjdk-debugsource-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: 954ed6dc74b55391d2350e33103c9efc46692c248350d126a5b9f3e96cf43bd4

java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: 6aac560ccc90ef8c040f0005eba9164cce330b5fb79028c4b8d83925d3f574a6

java-1.8.0-openjdk-demo-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: b2ce0270b6ee73fb96b897b8808e1dbfc94745b0285ae0cd39da098787593abf

java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: c0c11bd3af54031e1cab1c21ad75bd8a8e0ff8154c89415bd7e7c3d205edc426

java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: 09b185a1c41a92f4d9226a5dff003d863fd44880ea84d76a7dd207b07360754b

java-1.8.0-openjdk-devel-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: 78686b1f0a7f84ae05dc0b749c3e7f5557511a1f8a6f96f279337b60a2e11b50

java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: 320a802280258ce2beef991c8e48aaae7a2eadd45edfe46a7df18f8b03e2442b

java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: 0088f4469c4e7cadac7b8c642badf96404e0bae9be8085cfe92a2e35dcf1f958

java-1.8.0-openjdk-headless-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: cbf54ad658a11ad4db7222995fa47caea9a726a3c5baccd61b97256e4bfbc9b7

java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: e1ba2059999b2c679560e65ae955010ba6aea6b03cb8c5755671383033606d77

java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el8_4.noarch.rpm

SHA-256: 6e1d9567630259dc56705b5b1de3c22a018c3f6c4681c44cd5b90ab2713205b0

java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el8_4.noarch.rpm

SHA-256: 439f5b6a6449a5b0ec1cc7bc1560297defa42544a4099afe937e7cd1473ccb12

java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: 633af463d72a206da5d6cff17c60590b5112789b35074803971152d31847167c

java-1.8.0-openjdk-src-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: 9e60d63bb48353a591c1fd6da7eb8cd344654225c072326574ca34a69f685f15

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4

SRPM

java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.src.rpm

SHA-256: bec7ea6c380b36f521765966a549daea3ef3c21eb5978cef753e285b992e7fbe

x86_64

java-1.8.0-openjdk-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: bdf5a6b9cd2c12b200237da84532e04258c58b613e855b298ed400dbf7d5cf5d

java-1.8.0-openjdk-accessibility-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 3b9a0695d3df1e5ccd125892178d12dc1d0ec6397d82b8cd1f5abb2d9f05acae

java-1.8.0-openjdk-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: a6775c2372040dc2df57172ead47b3c641955ecb6a80841abc22b981ab7b2524

java-1.8.0-openjdk-debugsource-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 6e8e40b18b1c36598aa209901395eba9a74b3bff5d465ad05ba867135d3fa037

java-1.8.0-openjdk-demo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 34c48bd0a881b03724befea9db1f3e26a35a2edf4a59e4c87175ecf354bcf1a1

java-1.8.0-openjdk-demo-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: abac86b0e8cc2173dccddf3028597412dd274beeba12a737a5c30797047ff98e

java-1.8.0-openjdk-demo-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: c052d31d0bc79864d6e09b496db5656c952dc7496a0f0f5642aa097a3b6906cf

java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: d4b68c70c5c0ac4567d80824ae19b74a02d6f3cd420a09d065523c060f0d8580

java-1.8.0-openjdk-devel-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: b359f140445ea92989b298f4a4eb23c7c0d3e6efb9e9066f0a8a4aaf0d1423ec

java-1.8.0-openjdk-devel-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 22ab032aaecb2745306c368ca8d9b71dd48e3c0d8c78803c008e379ce7b029e4

java-1.8.0-openjdk-devel-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: d8a464b5fda29671820e38f5d79a7017c914f4296feeda67e7b78877567b3805

java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 936ce83fd3786af9a9e9e76e75c5a9df50d99dd3ec33c496f66e1a7b8bc366ca

java-1.8.0-openjdk-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 3cf6bc23cde23f7489abde021c232b9b98249275e7f67b7586d61a807d6c6f56

java-1.8.0-openjdk-headless-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 8d443fd45534241d50dbbbaae7c1307038b482f1a2776480570aa3f5c86ed005

java-1.8.0-openjdk-headless-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 9ddd4538b4d01d3aaee18401832ecc6bf685a061a8df412ea8391136a47cea46

java-1.8.0-openjdk-headless-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 39c1400fd1c21c5d793d2e1a54290a16cd0845fb4db94e0c60ea835a6b0316d9

java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 3c01c74fdef5447bd3ba511b4cffcc163d3ac67506638e86bdf246188e6b633c

java-1.8.0-openjdk-javadoc-1.8.0.342.b07-1.el8_4.noarch.rpm

SHA-256: 6e1d9567630259dc56705b5b1de3c22a018c3f6c4681c44cd5b90ab2713205b0

java-1.8.0-openjdk-javadoc-zip-1.8.0.342.b07-1.el8_4.noarch.rpm

SHA-256: 439f5b6a6449a5b0ec1cc7bc1560297defa42544a4099afe937e7cd1473ccb12

java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: acbd61ffe943e8899b97d415ed9c89f066add57ec5d654729eebdd694c683914

java-1.8.0-openjdk-src-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: ad8eb59dfbb88f898326461ee0ed7a48159c613db9c9213ee3a86faf0e0dd291

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4

SRPM

x86_64

java-1.8.0-openjdk-accessibility-fastdebug-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 34e83b0e6360b96fc3cd577fd9873c076f0e9cf3143aefd7a65df9970fce40e3

java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 97c02bb051c5c91b1abf7cfcb10504b6ef62ce38799f20be94bff27a5f7c67ed

java-1.8.0-openjdk-debugsource-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 6e8e40b18b1c36598aa209901395eba9a74b3bff5d465ad05ba867135d3fa037

java-1.8.0-openjdk-demo-fastdebug-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: d82febc14624b47e9edad52b22e9abbf64935ede3935051ed0a55da2d0e98c8f

java-1.8.0-openjdk-demo-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: c052d31d0bc79864d6e09b496db5656c952dc7496a0f0f5642aa097a3b6906cf

java-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 4e8cb9e22ee30dc80f085a04a376c22826bcde6279fd07f130085792042c0307

java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: d4b68c70c5c0ac4567d80824ae19b74a02d6f3cd420a09d065523c060f0d8580

java-1.8.0-openjdk-devel-fastdebug-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: fdbe4472a1fd3e24674121aba7f0679520b36878b01b789664afb8e20a22230c

java-1.8.0-openjdk-devel-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: d8a464b5fda29671820e38f5d79a7017c914f4296feeda67e7b78877567b3805

java-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 2f921d42940359f2a43db65aeaee79879535bff00df88b62cde2605f8ac39f9e

java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 936ce83fd3786af9a9e9e76e75c5a9df50d99dd3ec33c496f66e1a7b8bc366ca

java-1.8.0-openjdk-fastdebug-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: b9020a4b5a4eb92535b16df2fff85c5f9c8351270a14651a553256a8083a4cea

java-1.8.0-openjdk-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 3cf6bc23cde23f7489abde021c232b9b98249275e7f67b7586d61a807d6c6f56

java-1.8.0-openjdk-headless-fastdebug-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 8aff63268f3c0c5221ce237bd25ebda225681aed1caaa6c73dcd09d2ca36b928

java-1.8.0-openjdk-headless-fastdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 39c1400fd1c21c5d793d2e1a54290a16cd0845fb4db94e0c60ea835a6b0316d9

java-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 6f631035dfa1d91af1cf25f9ea78a3654c08bb9a443a19c37361551462d39bbd

java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 3c01c74fdef5447bd3ba511b4cffcc163d3ac67506638e86bdf246188e6b633c

java-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 5916f4ea46d61aa6c3b668255019ded54f9676b7d5301746e3247d244f3ea628

java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: acbd61ffe943e8899b97d415ed9c89f066add57ec5d654729eebdd694c683914

java-1.8.0-openjdk-src-fastdebug-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: b413282095485d70cf801337f7f07a0b3fce6b325900a032385b6a1caf436734

java-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el8_4.x86_64.rpm

SHA-256: 58c7fc8f65d6d5ee1be560cfc414fe78ea54cd15eb68f12e30150b07950e5f2c

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4

SRPM

ppc64le

java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: 12e2fe49c1f8cc4029137f18b6bcb03d8ae663087c7d8dc6f87733fe67d77f19

java-1.8.0-openjdk-debugsource-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: 954ed6dc74b55391d2350e33103c9efc46692c248350d126a5b9f3e96cf43bd4

java-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: da200e1f0d145cf2f2e45d976cd84fe0837da566d6a46d48f8df3dfe92d5788a

java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: c0c11bd3af54031e1cab1c21ad75bd8a8e0ff8154c89415bd7e7c3d205edc426

java-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: 98a7218e3bf47734be2d65fa8f6c8291b27b0430e69ccdba62c89d353a0b7898

java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: 320a802280258ce2beef991c8e48aaae7a2eadd45edfe46a7df18f8b03e2442b

java-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: aea87839380cf033fcbfa083097f562357d1d4aa516fc8fd6bcf54876c77de54

java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: e1ba2059999b2c679560e65ae955010ba6aea6b03cb8c5755671383033606d77

java-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: f55498aa3c762d86c01616e066a5ca8e874777b26c74e56a392d1a5f298e08ab

java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: 633af463d72a206da5d6cff17c60590b5112789b35074803971152d31847167c

java-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el8_4.ppc64le.rpm

SHA-256: 2b0943b916e6dbccd34ac8136d8a7141d1d2d098ec080c3fdf1cfa5b08eade2b

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4

SRPM

aarch64

java-1.8.0-openjdk-accessibility-slowdebug-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: cdbe99922cd401dedc89a11b695bd2be23ab9d1f6db325ae4a3dba3e9c1c926c

java-1.8.0-openjdk-debugsource-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: 5c2b3e3ee068f01096b71713aad87275d37af268c8e5487d257bc6ea7db53c71

java-1.8.0-openjdk-demo-slowdebug-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: 40f711ca4d1c5a5470620a508c633fd7035cfbb087bd812dbd9127a519318f03

java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: fe8c1ad0c2a595832f18760ae163b30b003a2be94a330c210c995ef88d446c7b

java-1.8.0-openjdk-devel-slowdebug-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: d8b55cc9cea00b1e6bd8156fbe394992efb879b7a76c1f3ae7c94332ebbab459

java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: a4f61006b4d9e5f7596679d88a5c3d0206806f425b5c3ff0a4573eed65bd4638

java-1.8.0-openjdk-headless-slowdebug-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: c04927ef028de4256f136a8c0e1828385860c5daf4955a22adcf351d14fdf669

java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: 098ae3475282f6c05a6c40fd1f82712fc87ca1bbf04b49b70f48ffb4455d89ba

java-1.8.0-openjdk-slowdebug-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: dd389d42fa130c6a242ba9243ff3171639e7cdc3eba9509a8c826da6f3f8758a

java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: e0681a5ead6dfc7fffa19ac992c4b8f0c36a23d655fa0dfc136bf88792962ec4

java-1.8.0-openjdk-src-slowdebug-1.8.0.342.b07-1.el8_4.aarch64.rpm

SHA-256: 0e8d77d979948b91bae85e606c394fd12a3704bffe94bf470d10793468ca6d45

Related news

Red Hat Security Advisory 2024-3708-03

Red Hat Security Advisory 2024-3708-03 - Red Hat build of Apache Camel 3.20.6 for Spring Boot release and security update is now available. Issues addressed include denial of service and server-side request forgery vulnerabilities.

CVE-2023-28864: Chef Infra Server Release Notes

Progress Chef Infra Server before 15.7 allows a local attacker to exploit a /var/opt/opscode/local-mode-cache/backup world-readable temporary backup path to access sensitive information, resulting in the disclosure of all indexed node data, because OpenSearch credentials are exposed. (The data typically includes credentials for additional systems.) The attacker must wait for an admin to run the "chef-server-ctl reconfigure" command.

CVE-2023-26298: HP Device Manager Security Updates

Previous versions of HP Device Manager (prior to HPDM 5.0.10) could potentially allow command injection and/or elevation of privileges.

CVE-2022-46756: DSA-2022-335: Dell VxRail Security Update for Multiple Third-Party Component Vulnerabilities

Dell VxRail, versions prior to 7.0.410, contain a Container Escape Vulnerability. A local high-privileged attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the container's underlying OS. Exploitation may lead to a system take over by an attacker.

CVE-2022-41299: Security Bulletin: IBM Cloud Transformation Advisor is vulnerable to multiple vulnerabilities

IBM Cloud Transformation Advisor 2.0.1 through 3.3.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 237214.

Red Hat Security Advisory 2022-6262-01

Red Hat Security Advisory 2022-6262-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.6.61. Issues addressed include a bypass vulnerability.

RHSA-2022:6252: Red Hat Security Advisory: OpenShift Container Platform 3.11.784 security update

Red Hat OpenShift Container Platform release 3.11.784 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 3.11. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-39226: grafana: Snapshot authentication bypass

Red Hat Security Advisory 2022-6053-01

Red Hat Security Advisory 2022-6053-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.56.

RHSA-2022:5879: Red Hat Security Advisory: OpenShift Container Platform 4.9.45 bug fix and security update

Red Hat OpenShift Container Platform release 4.9.45 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2403: openshift: oauth-serving-cert configmap contains cluster certificate private key

RHSA-2022:5909: Red Hat Security Advisory: Openshift Logging Bug Fix and security update Release (5.2.13)

Openshift Logging Bug Fix Release (5.2.13) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS

RHSA-2022:5908: Red Hat Security Advisory: Openshift Logging Bug Fix and security update Release (5.3.10)

Openshift Logging Bug Fix Release (5.3.10) Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2021-38561: golang: out-of-bounds read in golang.org/x/text/language leads to DoS

Red Hat Security Advisory 2022-5756-01

Red Hat Security Advisory 2022-5756-01 - The OpenJDK 11 packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. This release of the Red Hat build of OpenJDK 11 for Windows serves as a replacement for the Red Hat build of OpenJDK 11 and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.

Red Hat Security Advisory 2022-5753-01

Red Hat Security Advisory 2022-5753-01 - The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. This release of the Red Hat build of OpenJDK 8 for Windows serves as a replacement for the Red Hat build of OpenJDK 8 and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.

RHSA-2022:5757: Red Hat Security Advisory: OpenJDK 17.0.4 security update for Windows Builds

The Red Hat build of OpenJDK 17 (java-17-openjdk) is now available for Windows. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-21549: OpenJDK: random exponentials issue (Libraries, 8283875) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5756: Red Hat Security Advisory: OpenJDK 11.0.16 security update for Windows Builds

The Red Hat Build of OpenJDK 11 (java-11-openjdk) is now available for Windows. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5754: Red Hat Security Advisory: OpenJDK 8u342 security update for Portable Linux Builds

The Red Hat build of OpenJDK 8 (java-1.8.0-openjdk) is now available for portable Linux. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5753: Red Hat Security Advisory: OpenJDK 8u342 Windows builds release and security update

The Red Hat build of OpenJDK 8 (java-1.8.0-openjdk) is now available for Windows. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

Red Hat Security Advisory 2022-5681-01

Red Hat Security Advisory 2022-5681-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Red Hat Security Advisory 2022-5709-01

Red Hat Security Advisory 2022-5709-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.

Red Hat Security Advisory 2022-5685-01

Red Hat Security Advisory 2022-5685-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

RHSA-2022:5726: Red Hat Security Advisory: java-17-openjdk security, bug fix, and enhancement update

An update for java-17-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-21549: OpenJDK: random exponentials issue (Libraries, 8283875) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5698: Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update

An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5698: Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update

An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5698: Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update

An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5696: Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update

An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5696: Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update

An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5696: Red Hat Security Advisory: java-1.8.0-openjdk security, bug fix, and enhancement update

An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5700: Red Hat Security Advisory: java-1.8.0-openjdk security update

An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5701: Red Hat Security Advisory: java-1.8.0-openjdk security update

An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5701: Red Hat Security Advisory: java-1.8.0-openjdk security update

An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5695: Red Hat Security Advisory: java-11-openjdk security, bug fix, and enhancement update

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5695: Red Hat Security Advisory: java-11-openjdk security, bug fix, and enhancement update

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5695: Red Hat Security Advisory: java-11-openjdk security, bug fix, and enhancement update

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5687: Red Hat Security Advisory: java-11-openjdk security, bug fix, and enhancement update

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5687: Red Hat Security Advisory: java-11-openjdk security, bug fix, and enhancement update

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5687: Red Hat Security Advisory: java-11-openjdk security, bug fix, and enhancement update

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5681: Red Hat Security Advisory: java-11-openjdk security and bug fix update

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5681: Red Hat Security Advisory: java-11-openjdk security and bug fix update

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5683: Red Hat Security Advisory: java-11-openjdk security, bug fix, and enhancement update

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5683: Red Hat Security Advisory: java-11-openjdk security, bug fix, and enhancement update

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5683: Red Hat Security Advisory: java-11-openjdk security, bug fix, and enhancement update

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5684: Red Hat Security Advisory: java-11-openjdk security update

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5684: Red Hat Security Advisory: java-11-openjdk security update

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5684: Red Hat Security Advisory: java-11-openjdk security update

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5685: Red Hat Security Advisory: java-11-openjdk security update

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5685: Red Hat Security Advisory: java-11-openjdk security update

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

RHSA-2022:5685: Red Hat Security Advisory: java-11-openjdk security update

An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21540: OpenJDK: class compilation issue (Hotspot, 8281859) * CVE-2022-21541: OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) * CVE-2022-34169: OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407)

GHSA-9339-86wc-4qgf: Apache Xalan Java XSLT library integer truncation issue when processing malicious XSLT stylesheets

The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. The Apache Xalan Java project is dormant and in the process of being retired. No future releases of Apache Xalan Java to address this issue are expected. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.

CVE-2022-21586: Oracle Critical Patch Update Advisory - July 2022

Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Trade Finance accessible data as well as unauthorized access to critical data or complete access to all Oracle Banking Trade Finance accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N).

CVE-2022-21586: Oracle Critical Patch Update Advisory - July 2022

Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Trade Finance accessible data as well as unauthorized access to critical data or complete access to all Oracle Banking Trade Finance accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N).

CVE-2022-21586: Oracle Critical Patch Update Advisory - July 2022

Vulnerability in the Oracle Banking Trade Finance product of Oracle Financial Services Applications (component: Infrastructure). The supported version that is affected is 14.5. Difficult to exploit vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Banking Trade Finance. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Banking Trade Finance accessible data as well as unauthorized access to critical data or complete access to all Oracle Banking Trade Finance accessible data. CVSS 3.1 Base Score 6.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N).

CVE-2022-34169

The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. The Apache Xalan Java project is dormant and in the process of being retired. No future releases of Apache Xalan Java to address this issue are expected. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.