Oracle9: ELSA-2022-5695: java Important Security Update | LinuxSecu...
Oracle Linux Security Advisory ELSA-2022-5695

https://linux.oracle.com/errata/ELSA-2022-5695.html

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

x86_64:
java-11-openjdk-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm
java-11-openjdk-demo-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm
java-11-openjdk-devel-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm
java-11-openjdk-headless-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm
java-11-openjdk-javadoc-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm
java-11-openjdk-javadoc-zip-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm
java-11-openjdk-jmods-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm
java-11-openjdk-src-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm
java-11-openjdk-static-libs-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm
java-11-openjdk-demo-fastdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm
java-11-openjdk-demo-slowdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm
java-11-openjdk-devel-fastdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm
java-11-openjdk-devel-slowdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm
java-11-openjdk-fastdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm
java-11-openjdk-headless-fastdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm
java-11-openjdk-headless-slowdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm
java-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm
java-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm
java-11-openjdk-slowdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm
java-11-openjdk-src-fastdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm
java-11-openjdk-src-slowdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm
java-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm
java-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm

aarch64:
java-11-openjdk-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm
java-11-openjdk-demo-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm
java-11-openjdk-devel-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm
java-11-openjdk-headless-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm
java-11-openjdk-javadoc-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm
java-11-openjdk-javadoc-zip-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm
java-11-openjdk-jmods-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm
java-11-openjdk-src-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm
java-11-openjdk-static-libs-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm
java-11-openjdk-demo-fastdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm
java-11-openjdk-demo-slowdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm
java-11-openjdk-devel-fastdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm
java-11-openjdk-devel-slowdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm
java-11-openjdk-fastdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm
java-11-openjdk-headless-fastdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm
java-11-openjdk-headless-slowdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm
java-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm
java-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm
java-11-openjdk-slowdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm
java-11-openjdk-src-fastdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm
java-11-openjdk-src-slowdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm
java-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm
java-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm


SRPMS:
https://oss.oracle.com/ol9/SRPMS-updates/java-11-openjdk-11.0.16.0.8-1.0.1.el9_0.src.rpm

Related CVEs:

CVE-2022-21540
CVE-2022-21541
CVE-2022-34169




Description of changes:

[1:11.0.16.0.8-1.0.1]
- Replace upstream references [Orabug: 34340155]

[1:11.0.16.0.8-1]
- Update to jdk-11.0.16+8
- Update release notes to 11.0.16+8
- Use same tarball naming style as java-17-openjdk and java-latest-openjdk
- Drop JDK-8257794 patch now upstreamed
- Print release file during build, which should now include a correct SOURCE value from .src-rev
- Update tarball script with IcedTea GitHub URL and .src-rev generation
- Use "git apply" with patches in the tarball script to allow binary diffs
- Include script to generate bug list for release notes
- Update tzdata requirement to 2022a to match JDK-8283350
- Make use of the vendor version string to store our version & release rather than an upstream release date
- Explicitly require crypto-policies during build and runtime for system security properties
- Rebase FIPS patches from fips branch and simplify by using a single patch from that repository
- * RH2036462: sun.security.pkcs11.wrapper.PKCS11.getInstance breakage
- * RH2090378: Revert to disabling system security properties and FIPS mode support together
- Rebase RH1648249 nss.cfg patch so it applies after the FIPS patch
- Enable system security properties in the RPM (now disabled by default in the FIPS repo)
- Improve security properties test to check both enabled and disabled behaviour
- Run security properties test with property debugging on
- Resolves: rhbz#2106516
- Resolves: rhbz#2099915
- Resolves: rhbz#2107868

[1:11.0.16.0.8-1]
- Add additional patch during tarball generation to align tests with ECC changes
- Related: rhbz#2106516

[1:11.0.16.0.8-1]
- RH2007331: SecretKey generate/import operations don't add the CKA_SIGN attribute in FIPS mode
- Resolves: rhbz#2107866


_______________________________________________
El-errata mailing list
[email protected]
https://oss.oracle.com/mailman/listinfo/el-errata

Oracle9: ELSA-2022-5695: java Important Security Update

Summary

Description of changes: [1:11.0.16.0.8-1.0.1] - Replace upstream references [Orabug: 34340155] [1:11.0.16.0.8-1] - Update to jdk-11.0.16+8 - Update release notes to 11.0.16+8 - Use same tarball naming style as java-17-openjdk and java-latest-openjdk - Drop JDK-8257794 patch now upstreamed - Print release file during build, which should now include a correct SOURCE value from .src-rev - Update tarball script with IcedTea GitHub URL and .src-rev generation - Use "git apply" with patches in the tarball script to allow binary diffs - Include script to generate bug list for release notes - Update tzdata requirement to 2022a to match JDK-8283350 - Make use of the vendor version string to store our version & release rather than an upstream release date - Explicitly require crypto-policies during build and runtime for system security properties - Rebase FIPS patches from fips branch and simplify by using a single patch from that repository - * RH2036462: sun.security.pkcs11.wrapper.PKCS11.getInstance breakage - * RH2090378: Revert to disabling system security properties and FIPS mode support together - Rebase RH1648249 nss.cfg patch so it applies after the FIPS patch - Enable system security properties in the RPM (now disabled by default in the FIPS repo) - Improve security properties test to check both enabled and disabled behaviour - Run security properties test with property debugging on - Resolves: rhbz#2106516 - Resolves: rhbz#2099915 - Resolves: rhbz#2107868 [1:11.0.16.0.8-1] - Add additional patch during tarball generation to align tests with ECC changes - Related: rhbz#2106516 [1:11.0.16.0.8-1] - RH2007331: SecretKey generate/import operations don't add the CKA_SIGN attribute in FIPS mode - Resolves: rhbz#2107866

i386

x86_64

java-11-openjdk-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm java-11-openjdk-demo-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm java-11-openjdk-devel-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm java-11-openjdk-headless-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm java-11-openjdk-javadoc-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm java-11-openjdk-javadoc-zip-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm java-11-openjdk-jmods-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm java-11-openjdk-src-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm java-11-openjdk-static-libs-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm java-11-openjdk-demo-fastdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm java-11-openjdk-demo-slowdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm java-11-openjdk-devel-fastdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm java-11-openjdk-devel-slowdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm java-11-openjdk-fastdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm java-11-openjdk-headless-fastdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm java-11-openjdk-headless-slowdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm java-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm java-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm java-11-openjdk-slowdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm java-11-openjdk-src-fastdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm java-11-openjdk-src-slowdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm java-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm java-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.0.1.el9_0.x86_64.rpm aarch64: java-11-openjdk-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm java-11-openjdk-demo-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm java-11-openjdk-devel-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm java-11-openjdk-headless-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm java-11-openjdk-javadoc-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm java-11-openjdk-javadoc-zip-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm java-11-openjdk-jmods-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm java-11-openjdk-src-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm java-11-openjdk-static-libs-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm java-11-openjdk-demo-fastdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm java-11-openjdk-demo-slowdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm java-11-openjdk-devel-fastdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm java-11-openjdk-devel-slowdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm java-11-openjdk-fastdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm java-11-openjdk-headless-fastdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm java-11-openjdk-headless-slowdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm java-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm java-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm java-11-openjdk-slowdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm java-11-openjdk-src-fastdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm java-11-openjdk-src-slowdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm java-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm java-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.0.1.el9_0.aarch64.rpm

SRPMS

https://oss.oracle.com/ol9/SRPMS-updates/java-11-openjdk-11.0.16.0.8-1.0.1.el9_0.src.rpm

Severity
Related CVEs: CVE-2022-21540 CVE-2022-21541 CVE-2022-34169

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.