Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2023:1890: Red Hat Security Advisory: java-17-openjdk security and bug fix update

An update for java-17-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2023-21930: Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
  • CVE-2023-21937: Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
  • CVE-2023-21938: Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
  • CVE-2023-21939: Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
  • CVE-2023-21954: Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
  • CVE-2023-21967: Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
  • CVE-2023-21968: Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Red Hat Security Data
#vulnerability#web#apple#linux#red_hat#js#java#oracle#graalvm#auth#ibm#sap#ssl

Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4

SRPM

java-17-openjdk-17.0.7.0.7-1.el8_4.src.rpm

SHA-256: febd8e8385d0a03884947da7e2d279bf3b2804fd5ffebbc3b21926bdab6fdcb1

x86_64

java-17-openjdk-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 9e8121ad48fcea44770eb57f76a1ee3cc9b19805bc026d325822a0c24a7f31c6

java-17-openjdk-debuginfo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 3d10ced7f6be78aaa0b49ee72254931ff1a364bb0eef2ad6d0b7a3eebfc3ae81

java-17-openjdk-debugsource-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 19068cb4e778b5d578db0a044002c68355c99b440a76baa46bac74600db54b04

java-17-openjdk-demo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 5d3f23a5433f49bc2597a824021aa95011ebb2bd6609abf00fcdbbe3369e4125

java-17-openjdk-devel-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 73cecaf78e2f2e4164ef87f7d54a6e6e74506c0e261012928e12e8c76e25ab77

java-17-openjdk-devel-debuginfo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 58722f16af81fed9249eabbc2cbd259597f7a174c527eba4aeefdad2dbc82b5c

java-17-openjdk-headless-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: db372dbab36943546d8c2fcd16874f7a0b97a15d641ffc984971329a330bf666

java-17-openjdk-headless-debuginfo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: c24db2f5fd12a017577ddef3598cffdfe9718b437f2b0aae72ba5bacafc575b9

java-17-openjdk-javadoc-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 26d065c4a674124f4936b7b619a64262c5ebb26dffdf69385b6f6de32073aca8

java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 2645e2fb450b433ab006a5c325fb95f95d4463493494bc01322c4a45d15ed9b2

java-17-openjdk-jmods-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 1abe34c5ec006e85b3de9d6a39f6abae1e19a40e120081b420d342f995fe2483

java-17-openjdk-src-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: ba8b54d646747385722103354f4ddf8dcd7113e24346ff32298ee03c7bf2aab9

java-17-openjdk-static-libs-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: c694612e518d5e6c3924eb502f8c8f76c6a394939ad7f38be880ca88714fa966

Red Hat Enterprise Linux Server - AUS 8.4

SRPM

java-17-openjdk-17.0.7.0.7-1.el8_4.src.rpm

SHA-256: febd8e8385d0a03884947da7e2d279bf3b2804fd5ffebbc3b21926bdab6fdcb1

x86_64

java-17-openjdk-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 9e8121ad48fcea44770eb57f76a1ee3cc9b19805bc026d325822a0c24a7f31c6

java-17-openjdk-debuginfo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 3d10ced7f6be78aaa0b49ee72254931ff1a364bb0eef2ad6d0b7a3eebfc3ae81

java-17-openjdk-debugsource-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 19068cb4e778b5d578db0a044002c68355c99b440a76baa46bac74600db54b04

java-17-openjdk-demo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 5d3f23a5433f49bc2597a824021aa95011ebb2bd6609abf00fcdbbe3369e4125

java-17-openjdk-devel-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 73cecaf78e2f2e4164ef87f7d54a6e6e74506c0e261012928e12e8c76e25ab77

java-17-openjdk-devel-debuginfo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 58722f16af81fed9249eabbc2cbd259597f7a174c527eba4aeefdad2dbc82b5c

java-17-openjdk-headless-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: db372dbab36943546d8c2fcd16874f7a0b97a15d641ffc984971329a330bf666

java-17-openjdk-headless-debuginfo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: c24db2f5fd12a017577ddef3598cffdfe9718b437f2b0aae72ba5bacafc575b9

java-17-openjdk-javadoc-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 26d065c4a674124f4936b7b619a64262c5ebb26dffdf69385b6f6de32073aca8

java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 2645e2fb450b433ab006a5c325fb95f95d4463493494bc01322c4a45d15ed9b2

java-17-openjdk-jmods-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 1abe34c5ec006e85b3de9d6a39f6abae1e19a40e120081b420d342f995fe2483

java-17-openjdk-src-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: ba8b54d646747385722103354f4ddf8dcd7113e24346ff32298ee03c7bf2aab9

java-17-openjdk-static-libs-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: c694612e518d5e6c3924eb502f8c8f76c6a394939ad7f38be880ca88714fa966

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4

SRPM

java-17-openjdk-17.0.7.0.7-1.el8_4.src.rpm

SHA-256: febd8e8385d0a03884947da7e2d279bf3b2804fd5ffebbc3b21926bdab6fdcb1

s390x

java-17-openjdk-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: b93f526ee6a902180ba092aced4a2a21d0467a3f9fdf568a13afb9f35f1666de

java-17-openjdk-debuginfo-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: 719d6f4e92fb650386b3e133345b2b9b4545d8e132d52a54a8804e1d27311d2e

java-17-openjdk-debugsource-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: b3235e5c00a547576ba9c0128ddae4c2437d2d3b91f56ee3cd53d6869083b0fd

java-17-openjdk-demo-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: 8988efafcd4fa71a13babcfcbdfb21df4422f76c7cc648d91fc0f237bfb30ca4

java-17-openjdk-devel-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: 6792d9e2d941c3f7d2b3ad95db402fcc01891a904431398dd3f50f268e79fcef

java-17-openjdk-devel-debuginfo-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: a22296189bec39eac81281f95c2acc3a49b752314bdec4246fc750c38f0f5c15

java-17-openjdk-headless-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: 0ee3f4f4acffd0992f4edff6b773d71993fe30f5ddb2ca0333b204ffdd4852d2

java-17-openjdk-headless-debuginfo-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: 628806f6fa11b2af8ec6a59cda267de56f4ec413207143316ed919acde511c8c

java-17-openjdk-javadoc-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: 51f61e55eb5cabe5d8c4260281f93f9c0045afabb6df1fe8fda0f461141b37c0

java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: 7af7c5b754d823cbce5b532eb7a24bbe37943b00a3622357f9e3416671c5a51c

java-17-openjdk-jmods-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: 1d02d251856cb2f13002b74beaf10b3f1ca080c3d6484cc98f4765a989c8d233

java-17-openjdk-src-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: 7d3ab183d62e7df2163f40baf91885905747cca4f02a5724cc57c3545f253299

java-17-openjdk-static-libs-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: b37f26e690bd242a68cb7caa95147a4c3c58a6e98e080bcf64f95d579451cc5d

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4

SRPM

java-17-openjdk-17.0.7.0.7-1.el8_4.src.rpm

SHA-256: febd8e8385d0a03884947da7e2d279bf3b2804fd5ffebbc3b21926bdab6fdcb1

ppc64le

java-17-openjdk-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: fcc44f211e6657a3671ed876632d9c7e85dbdfb4edb319a4740181a0b00f080a

java-17-openjdk-debuginfo-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: 4d5d6b5f4ab2df27f845b7af5a3dee5986582ef74c26bcd2f2d776a61b9876bb

java-17-openjdk-debugsource-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: faeac8231d8357fbd1226859bfa0b5ca7c63d6005da426a073d69f7d14b499f9

java-17-openjdk-demo-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: 02611a6c95cdd116d108d8d784176f67ad19c8b2deea66686abcdafda69efdcf

java-17-openjdk-devel-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: e66f0060f989b375b5465077e1867548f712dc0566ec45a36afd03cbdc1bde00

java-17-openjdk-devel-debuginfo-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: 236a96ec370cfdd2c3d2a783dd16775ddad300a7034ea992fb5164d4b31bd0d7

java-17-openjdk-headless-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: 0dd6b635ee5f1008c5fd1efe1dcffd12403b2730bd510874864ee98b6ba06800

java-17-openjdk-headless-debuginfo-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: d974f7a4289aabd7c5765ed94cc23deaaa17accaeb4b5c098a666b7374342f0b

java-17-openjdk-javadoc-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: 181ec3dc726b698a7e7e27532bc8a76a04c11bfbcf510265c03193d5383572bc

java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: dbeffdd3f39701af6bea1fe95da4cb327e9ed4a3e0110c53f0068d95fd4cedc8

java-17-openjdk-jmods-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: 7eb49061816ad652f8f1c4665e16ec69e61fb17f7699ad3b6dafeb47125b8662

java-17-openjdk-src-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: 0bbf2bf008c05e9af0ea5238eafcc5e3d7212052d28ffe67237b0be1f391ba35

java-17-openjdk-static-libs-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: bf1b0f4a504b16173fcc72bbfef055f8843b96b40cf9b92fce34c0cece784267

Red Hat Enterprise Linux Server - TUS 8.4

SRPM

java-17-openjdk-17.0.7.0.7-1.el8_4.src.rpm

SHA-256: febd8e8385d0a03884947da7e2d279bf3b2804fd5ffebbc3b21926bdab6fdcb1

x86_64

java-17-openjdk-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 9e8121ad48fcea44770eb57f76a1ee3cc9b19805bc026d325822a0c24a7f31c6

java-17-openjdk-debuginfo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 3d10ced7f6be78aaa0b49ee72254931ff1a364bb0eef2ad6d0b7a3eebfc3ae81

java-17-openjdk-debugsource-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 19068cb4e778b5d578db0a044002c68355c99b440a76baa46bac74600db54b04

java-17-openjdk-demo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 5d3f23a5433f49bc2597a824021aa95011ebb2bd6609abf00fcdbbe3369e4125

java-17-openjdk-devel-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 73cecaf78e2f2e4164ef87f7d54a6e6e74506c0e261012928e12e8c76e25ab77

java-17-openjdk-devel-debuginfo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 58722f16af81fed9249eabbc2cbd259597f7a174c527eba4aeefdad2dbc82b5c

java-17-openjdk-headless-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: db372dbab36943546d8c2fcd16874f7a0b97a15d641ffc984971329a330bf666

java-17-openjdk-headless-debuginfo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: c24db2f5fd12a017577ddef3598cffdfe9718b437f2b0aae72ba5bacafc575b9

java-17-openjdk-javadoc-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 26d065c4a674124f4936b7b619a64262c5ebb26dffdf69385b6f6de32073aca8

java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 2645e2fb450b433ab006a5c325fb95f95d4463493494bc01322c4a45d15ed9b2

java-17-openjdk-jmods-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 1abe34c5ec006e85b3de9d6a39f6abae1e19a40e120081b420d342f995fe2483

java-17-openjdk-src-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: ba8b54d646747385722103354f4ddf8dcd7113e24346ff32298ee03c7bf2aab9

java-17-openjdk-static-libs-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: c694612e518d5e6c3924eb502f8c8f76c6a394939ad7f38be880ca88714fa966

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4

SRPM

java-17-openjdk-17.0.7.0.7-1.el8_4.src.rpm

SHA-256: febd8e8385d0a03884947da7e2d279bf3b2804fd5ffebbc3b21926bdab6fdcb1

aarch64

java-17-openjdk-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: 3b27c25f777ff6314d20810d9a5fcd01dec27307e16876b5dbba5f432b946fcc

java-17-openjdk-debuginfo-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: 26a664c8dae1e5028fe9d6b109833c15445b5226c94d155bb9221631bc63be9c

java-17-openjdk-debugsource-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: 767da053e5e0c7fd9b42a458bd63cc2398d9c345314b52e856dd8cb6303a0aca

java-17-openjdk-demo-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: 2123e87d7149dd2011b90c551453d70f209eb84f3ea907a8083513a1fe117e9f

java-17-openjdk-devel-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: b73c5baba6a9548fdb92a1523f8ffd3565f86db67cd10186a6e914591d8c299f

java-17-openjdk-devel-debuginfo-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: 36f4d60525fd5e7162a58692c8fba952053b42c1f43d405a146dbe4704144d31

java-17-openjdk-headless-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: 58dc0c206b03516f51488f10c618d7d457b557bede0f3308d87ed232166da137

java-17-openjdk-headless-debuginfo-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: bcf373bce39e2ca2a6874b95266068074d4d30a4c7e90bb30ad17161e78daebe

java-17-openjdk-javadoc-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: 6f0d56ecceb06f68270fcbd380df17b12d42ae016e9a89dffae5beea82aa7322

java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: 506909ec22ed416acbce3b6292eaeedee12ebac16d4d6484a21833c3508f2a6f

java-17-openjdk-jmods-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: 09854943867508306a302a3a87addb163647454b9a732829fe375b1da3f562c6

java-17-openjdk-src-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: 7b878e6d3af2a3396c65b9879342dc5d1c66021c85de52b8ea246751c2424b0f

java-17-openjdk-static-libs-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: 4db61060f10d046f9a17e03fc618b6a29e370fce89f33277e8fb7777fad83c33

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4

SRPM

java-17-openjdk-17.0.7.0.7-1.el8_4.src.rpm

SHA-256: febd8e8385d0a03884947da7e2d279bf3b2804fd5ffebbc3b21926bdab6fdcb1

ppc64le

java-17-openjdk-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: fcc44f211e6657a3671ed876632d9c7e85dbdfb4edb319a4740181a0b00f080a

java-17-openjdk-debuginfo-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: 4d5d6b5f4ab2df27f845b7af5a3dee5986582ef74c26bcd2f2d776a61b9876bb

java-17-openjdk-debugsource-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: faeac8231d8357fbd1226859bfa0b5ca7c63d6005da426a073d69f7d14b499f9

java-17-openjdk-demo-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: 02611a6c95cdd116d108d8d784176f67ad19c8b2deea66686abcdafda69efdcf

java-17-openjdk-devel-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: e66f0060f989b375b5465077e1867548f712dc0566ec45a36afd03cbdc1bde00

java-17-openjdk-devel-debuginfo-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: 236a96ec370cfdd2c3d2a783dd16775ddad300a7034ea992fb5164d4b31bd0d7

java-17-openjdk-headless-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: 0dd6b635ee5f1008c5fd1efe1dcffd12403b2730bd510874864ee98b6ba06800

java-17-openjdk-headless-debuginfo-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: d974f7a4289aabd7c5765ed94cc23deaaa17accaeb4b5c098a666b7374342f0b

java-17-openjdk-javadoc-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: 181ec3dc726b698a7e7e27532bc8a76a04c11bfbcf510265c03193d5383572bc

java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: dbeffdd3f39701af6bea1fe95da4cb327e9ed4a3e0110c53f0068d95fd4cedc8

java-17-openjdk-jmods-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: 7eb49061816ad652f8f1c4665e16ec69e61fb17f7699ad3b6dafeb47125b8662

java-17-openjdk-src-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: 0bbf2bf008c05e9af0ea5238eafcc5e3d7212052d28ffe67237b0be1f391ba35

java-17-openjdk-static-libs-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: bf1b0f4a504b16173fcc72bbfef055f8843b96b40cf9b92fce34c0cece784267

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4

SRPM

java-17-openjdk-17.0.7.0.7-1.el8_4.src.rpm

SHA-256: febd8e8385d0a03884947da7e2d279bf3b2804fd5ffebbc3b21926bdab6fdcb1

x86_64

java-17-openjdk-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 9e8121ad48fcea44770eb57f76a1ee3cc9b19805bc026d325822a0c24a7f31c6

java-17-openjdk-debuginfo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 3d10ced7f6be78aaa0b49ee72254931ff1a364bb0eef2ad6d0b7a3eebfc3ae81

java-17-openjdk-debugsource-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 19068cb4e778b5d578db0a044002c68355c99b440a76baa46bac74600db54b04

java-17-openjdk-demo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 5d3f23a5433f49bc2597a824021aa95011ebb2bd6609abf00fcdbbe3369e4125

java-17-openjdk-devel-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 73cecaf78e2f2e4164ef87f7d54a6e6e74506c0e261012928e12e8c76e25ab77

java-17-openjdk-devel-debuginfo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 58722f16af81fed9249eabbc2cbd259597f7a174c527eba4aeefdad2dbc82b5c

java-17-openjdk-headless-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: db372dbab36943546d8c2fcd16874f7a0b97a15d641ffc984971329a330bf666

java-17-openjdk-headless-debuginfo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: c24db2f5fd12a017577ddef3598cffdfe9718b437f2b0aae72ba5bacafc575b9

java-17-openjdk-javadoc-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 26d065c4a674124f4936b7b619a64262c5ebb26dffdf69385b6f6de32073aca8

java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 2645e2fb450b433ab006a5c325fb95f95d4463493494bc01322c4a45d15ed9b2

java-17-openjdk-jmods-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 1abe34c5ec006e85b3de9d6a39f6abae1e19a40e120081b420d342f995fe2483

java-17-openjdk-src-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: ba8b54d646747385722103354f4ddf8dcd7113e24346ff32298ee03c7bf2aab9

java-17-openjdk-static-libs-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: c694612e518d5e6c3924eb502f8c8f76c6a394939ad7f38be880ca88714fa966

Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support 8.4

SRPM

x86_64

java-17-openjdk-debuginfo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 3d10ced7f6be78aaa0b49ee72254931ff1a364bb0eef2ad6d0b7a3eebfc3ae81

java-17-openjdk-debugsource-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 19068cb4e778b5d578db0a044002c68355c99b440a76baa46bac74600db54b04

java-17-openjdk-demo-fastdebug-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 789b5d1a0814cd18198685a932f821254e84914505749f4a39a7401d491bb8d9

java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: ffeda965394f78518739d0c262954a9fb4c5d2db46d908d1bd4dbb422ce8fd45

java-17-openjdk-devel-debuginfo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 58722f16af81fed9249eabbc2cbd259597f7a174c527eba4aeefdad2dbc82b5c

java-17-openjdk-devel-fastdebug-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: d02883b2a01769908a466bef71b0122448c3257f638645bd500a0d11dd587e6d

java-17-openjdk-devel-fastdebug-debuginfo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: fa9b5681b6fe38fd1de9d2dc3c279047a8d62e883a2d34fa6ba0c0fc88ae2f32

java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 0b31e4871e2b2c5ccefef6270497d48b2cc7e3753c0034ec5a181c61123ba697

java-17-openjdk-devel-slowdebug-debuginfo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 9afaf755e77dcf3cd65b494ae08da8fdd2ab036c415bd94b2a7b0d45d5ea5834

java-17-openjdk-fastdebug-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 565d53dc2a3eddb09c709d6c7b0f922f944f43c6c7adba1761c3bbbe228dfbb8

java-17-openjdk-fastdebug-debuginfo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 970aab5e8f95b4812d644dc0ab87a8e6e08c3b635c67edaad14310c8fe52729c

java-17-openjdk-headless-debuginfo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: c24db2f5fd12a017577ddef3598cffdfe9718b437f2b0aae72ba5bacafc575b9

java-17-openjdk-headless-fastdebug-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 8a12e74559ff97104f48a4635342916eea54fd038479377dced501ade1bec8d8

java-17-openjdk-headless-fastdebug-debuginfo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 4ce2932674619dcef7e2efe9630d5fd686f9e4b7d64f07fc2de73c40ece227bd

java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 820926215db92e1af98800dc8b30c24a1a4f042f292edb1db22f7c7421032309

java-17-openjdk-headless-slowdebug-debuginfo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: fddb3d21f9b36f214d12ec6e69f5332fbd568b3989c8a69981432e3108ff5e41

java-17-openjdk-jmods-fastdebug-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: bbe622c10d87682490bbf2d667726cc0f9044c5ad9415b7f130816b47578129e

java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 840b061dc4a8cbacaf96a13c4e2c11d56d430be76a1466e24c3bfe9b66fa4990

java-17-openjdk-slowdebug-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 77549425af1638d3e96496f0a62bde66a08e57bcf35e7369e5804118343be297

java-17-openjdk-slowdebug-debuginfo-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: cd371f6ac670da64a0e01c1d8d8ec844d5a662662bdddbafa0fe6b7d149b386c

java-17-openjdk-src-fastdebug-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: ce8148853fbe45bf30b6a3cd741589204b3c7169542eba70f7b6b44a850ece3c

java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 0c25c6bc1ef69d26ed783632474c30f378e352767b84128ca4c858446e8a634a

java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 28cd8a703eccba2de8493242146f93ff948a1feb12f32bbedd6fa373774556b6

java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el8_4.x86_64.rpm

SHA-256: 3d06dd4d6435e65550d0a5a12f54b52e8aecb051434fed720efb0bd9f0b49563

Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support 8.4

SRPM

ppc64le

java-17-openjdk-debuginfo-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: 4d5d6b5f4ab2df27f845b7af5a3dee5986582ef74c26bcd2f2d776a61b9876bb

java-17-openjdk-debugsource-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: faeac8231d8357fbd1226859bfa0b5ca7c63d6005da426a073d69f7d14b499f9

java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: 22dd815469a32c13bc3af19c4f602ae1e36cd27dea14c3bc148022dabe555f4a

java-17-openjdk-devel-debuginfo-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: 236a96ec370cfdd2c3d2a783dd16775ddad300a7034ea992fb5164d4b31bd0d7

java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: 614f611de8992942d859f9b1f4bd17423ca49d2bfdd13f6939df9a984fdde1e8

java-17-openjdk-devel-slowdebug-debuginfo-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: bb494e9bc6fe4b0dfbdfcbbcc3e8242c3fa41500be783c342db39bbec585bec9

java-17-openjdk-headless-debuginfo-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: d974f7a4289aabd7c5765ed94cc23deaaa17accaeb4b5c098a666b7374342f0b

java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: 6c8174c32c807c1ae22f021d95db6422d66a48510e5cde21a0ba2ce023cd5e5c

java-17-openjdk-headless-slowdebug-debuginfo-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: 61446b0e776f32a871c0b3e5dbf48a23db4fca8c168de17b00329248e3fbbb21

java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: 9581ba7eae996e288a478b51b5b8bc14a870a9a796c571895bcb3d5657ce231f

java-17-openjdk-slowdebug-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: 136650aa91d70c9b38161776160957e6127e9afb2c2ce517609fd7d1af117277

java-17-openjdk-slowdebug-debuginfo-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: ca92f196c35bf0163bea94c4ee43d51d0c0e6ef481cbfc0e1306a6f4481512e5

java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: 8d3172fc1fd2a96da6dd6c5900c3fa70bf2fa31215d0be348b951c942619ea67

java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el8_4.ppc64le.rpm

SHA-256: af65e5b9714154b443db84ff9dd0fa8bc41864b8e6cac3cf334556ab77e6f289

Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support 8.4

SRPM

s390x

java-17-openjdk-debuginfo-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: 719d6f4e92fb650386b3e133345b2b9b4545d8e132d52a54a8804e1d27311d2e

java-17-openjdk-debugsource-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: b3235e5c00a547576ba9c0128ddae4c2437d2d3b91f56ee3cd53d6869083b0fd

java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: 513f5e29b71b911ba80b350aac890cd481bddeddd445e6bb35e73887ebdda23b

java-17-openjdk-devel-debuginfo-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: a22296189bec39eac81281f95c2acc3a49b752314bdec4246fc750c38f0f5c15

java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: b842db3a08be8521ed4657dad0a87ce23cce729e28c50d23e97cb25bed22bf2d

java-17-openjdk-devel-slowdebug-debuginfo-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: 6f8ac5df2d7850c0998a7a5b4eed42aa9eedc8779fe553bf5969764cd42ae21c

java-17-openjdk-headless-debuginfo-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: 628806f6fa11b2af8ec6a59cda267de56f4ec413207143316ed919acde511c8c

java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: eeebb3326b988f656fbcf9581589340296f622d95ffd051c0a17a9298bea9212

java-17-openjdk-headless-slowdebug-debuginfo-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: 0e449f9cbd6138bc4c8942d5d27ad1673141226f185d39ca2c773cdb4c92db83

java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: 83fc6621ac2a9a63c2103fb383f49cb0ddf6f4b7252a93f742a737cdbac08e19

java-17-openjdk-slowdebug-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: f504ad8850587c1e50e36e36c8c61a069f500b3ce7b83d37b967733913a8a819

java-17-openjdk-slowdebug-debuginfo-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: f0fdce5c2e2b92b52e847ccc88ca224e1869be1a5af920eb2bc387c6f75f05a9

java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: cc0dc899f7d45248bde6583034d24721c4796f9fd1eeb04070acf01fdd60e7b9

java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el8_4.s390x.rpm

SHA-256: 04472ed2f1dea312eb75b175d2cf21986cfff8ef9d8ada7994e1ae7d62fd43d9

Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support 8.4

SRPM

aarch64

java-17-openjdk-debuginfo-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: 26a664c8dae1e5028fe9d6b109833c15445b5226c94d155bb9221631bc63be9c

java-17-openjdk-debugsource-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: 767da053e5e0c7fd9b42a458bd63cc2398d9c345314b52e856dd8cb6303a0aca

java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: be740abc1f1cb0a26714190df51d018dbaa41d24e304c410ea7a94a900202921

java-17-openjdk-devel-debuginfo-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: 36f4d60525fd5e7162a58692c8fba952053b42c1f43d405a146dbe4704144d31

java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: 2ad08730934094b192d5d1874db8315588631f809796472353610aa756c5873b

java-17-openjdk-devel-slowdebug-debuginfo-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: b16495e36ae797942fa671a7262d0993d51bf6f294116d68ba44d10386b98371

java-17-openjdk-headless-debuginfo-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: bcf373bce39e2ca2a6874b95266068074d4d30a4c7e90bb30ad17161e78daebe

java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: 83063f165fcdfb69559a3084fb4169cb6c9e85457c7731c499f9d58a27741d47

java-17-openjdk-headless-slowdebug-debuginfo-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: efcd2b6c9d5d096cb487fa0ddea91fc546a432c95eb207e23277d259b6cbd9cf

java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: 98056e07f401042ffd01849ec3d44bfbc2b01d703ab1ebe77a9399c22472536e

java-17-openjdk-slowdebug-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: 93580b8b6ec762cd5845c835836829989721fa4308319aedf7052bfafb3af495

java-17-openjdk-slowdebug-debuginfo-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: 3e1bbc8bb4cc8ee0622d2e153b4ddb21b2a8d6d1273759116f22a9a2f664828f

java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: 13f9faaec75a6f357a68e4c4747ae9a37144f5c32a8b193145f3696dd7b71401

java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el8_4.aarch64.rpm

SHA-256: 44cceae408650cdb04330c85c08a6af917a303490cd1d4bdc3815b0d11a392b5

Red Hat Security Data: Latest News

RHSA-2023:5627: Red Hat Security Advisory: kernel security, bug fix, and enhancement update