Oracle9: ELSA-2022-5736: java Important Security Update | LinuxSecu...
Oracle Linux Security Advisory ELSA-2022-5736

https://linux.oracle.com/errata/ELSA-2022-5736.html

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

x86_64:
java-17-openjdk-17.0.4.0.8-2.el9_0.x86_64.rpm
java-17-openjdk-demo-17.0.4.0.8-2.el9_0.x86_64.rpm
java-17-openjdk-devel-17.0.4.0.8-2.el9_0.x86_64.rpm
java-17-openjdk-headless-17.0.4.0.8-2.el9_0.x86_64.rpm
java-17-openjdk-javadoc-17.0.4.0.8-2.el9_0.x86_64.rpm
java-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0.x86_64.rpm
java-17-openjdk-jmods-17.0.4.0.8-2.el9_0.x86_64.rpm
java-17-openjdk-src-17.0.4.0.8-2.el9_0.x86_64.rpm
java-17-openjdk-static-libs-17.0.4.0.8-2.el9_0.x86_64.rpm
java-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm
java-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm
java-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm
java-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm
java-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm
java-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm
java-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm
java-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm
java-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm
java-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm
java-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm
java-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm
java-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm
java-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm

aarch64:
java-17-openjdk-17.0.4.0.8-2.el9_0.aarch64.rpm
java-17-openjdk-demo-17.0.4.0.8-2.el9_0.aarch64.rpm
java-17-openjdk-devel-17.0.4.0.8-2.el9_0.aarch64.rpm
java-17-openjdk-headless-17.0.4.0.8-2.el9_0.aarch64.rpm
java-17-openjdk-javadoc-17.0.4.0.8-2.el9_0.aarch64.rpm
java-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0.aarch64.rpm
java-17-openjdk-jmods-17.0.4.0.8-2.el9_0.aarch64.rpm
java-17-openjdk-src-17.0.4.0.8-2.el9_0.aarch64.rpm
java-17-openjdk-static-libs-17.0.4.0.8-2.el9_0.aarch64.rpm
java-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0.aarch64.rpm
java-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0.aarch64.rpm
java-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0.aarch64.rpm
java-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0.aarch64.rpm
java-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0.aarch64.rpm
java-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0.aarch64.rpm
java-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0.aarch64.rpm
java-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0.aarch64.rpm
java-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0.aarch64.rpm
java-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0.aarch64.rpm
java-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0.aarch64.rpm
java-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0.aarch64.rpm
java-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0.aarch64.rpm
java-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0.aarch64.rpm


SRPMS:
https://oss.oracle.com/ol9/SRPMS-updates/java-17-openjdk-17.0.4.0.8-2.el9_0.src.rpm

Related CVEs:

CVE-2022-21540
CVE-2022-21541
CVE-2022-21549
CVE-2022-34169




Description of changes:

[1:17.0.4.0.8-0.2.ea]
- Revert the following changes until copy-java-configs has adapted to relative symlinks:
- * Move cacerts replacement to install section and retain original of this and tzdb.dat
- * Run tests on the installed image, rather than the build image
- * Introduce variables to refer to the static library installation directories
- * Use relative symlinks so they work within the image
- * Run debug symbols check during build stage, before the install strips them
- The move of turning on system security properties is retained so we don't ship with them off
- Related: rhbz#2084779

[1:17.0.4.0.8-1]
- Update to jdk-17.0.4.0+8
- Update release notes to 17.0.4.0+8
- Need to include the '.S' suffix in debuginfo checks after JDK-8284661
- Print release file during build, which should now include a correct SOURCE value from .src-rev
- Update tarball script with IcedTea GitHub URL and .src-rev generation
- Include script to generate bug list for release notes
- Update tzdata requirement to 2022a to match JDK-8283350
- Move EA designator check to prep so failures can be caught earlier
- Make EA designator check non-fatal while upstream is not maintaining it
- Explicitly require crypto-policies during build and runtime for system security properties
- Make use of the vendor version string to store our version & release rather than an upstream release date
- Include a test in the RPM to check the build has the correct vendor information.
- Rebase FIPS patches from fips-17u branch and simplify by using a single patch from that repository
- * RH2094027: SunEC runtime permission for FIPS
- * RH2036462: sun.security.pkcs11.wrapper.PKCS11.getInstance breakage
- * RH2090378: Revert to disabling system security properties and FIPS mode support together
- Rebase RH1648249 nss.cfg patch so it applies after the FIPS patch
- Enable system security properties in the RPM (now disabled by default in the FIPS repo)
- Improve security properties test to check both enabled and disabled behaviour
- Run security properties test with property debugging on
- Turn on system security properties as part of the build's install section
- Move cacerts replacement to install section and retain original of this and tzdb.dat
- Run tests on the installed image, rather than the build image
- Introduce variables to refer to the static library installation directories
- Use relative symlinks so they work within the image
- Run debug symbols check during build stage, before the install strips them
- Resolves: rhbz#2084779
- Resolves: rhbz#2099919
- Resolves: rhbz#2107943
- Resolves: rhbz#2107941
- Resolves: rhbz#2106523

[1:17.0.4.0.1-0.2.ea]
- Fix issue where CheckVendor.java test erroneously passes when it should fail.
- Add proper quoting so '&' is not treated as a special character by the shell.
- Related: rhbz#2084779

[1:17.0.3.0.7-2]
- RH2007331: SecretKey generate/import operations don't add the CKA_SIGN attribute in FIPS mode
- Resolves: rhbz#2105395


_______________________________________________
El-errata mailing list
[email protected]
https://oss.oracle.com/mailman/listinfo/el-errata

Oracle9: ELSA-2022-5736: java Important Security Update

Summary

Description of changes: [1:17.0.4.0.8-0.2.ea] - Revert the following changes until copy-java-configs has adapted to relative symlinks: - * Move cacerts replacement to install section and retain original of this and tzdb.dat - * Run tests on the installed image, rather than the build image - * Introduce variables to refer to the static library installation directories - * Use relative symlinks so they work within the image - * Run debug symbols check during build stage, before the install strips them - The move of turning on system security properties is retained so we don't ship with them off - Related: rhbz#2084779 [1:17.0.4.0.8-1] - Update to jdk-17.0.4.0+8 - Update release notes to 17.0.4.0+8 - Need to include the '.S' suffix in debuginfo checks after JDK-8284661 - Print release file during build, which should now include a correct SOURCE value from .src-rev - Update tarball script with IcedTea GitHub URL and .src-rev generation - Include script to generate bug list for release notes - Update tzdata requirement to 2022a to match JDK-8283350 - Move EA designator check to prep so failures can be caught earlier - Make EA designator check non-fatal while upstream is not maintaining it - Explicitly require crypto-policies during build and runtime for system security properties - Make use of the vendor version string to store our version & release rather than an upstream release date - Include a test in the RPM to check the build has the correct vendor information. - Rebase FIPS patches from fips-17u branch and simplify by using a single patch from that repository - * RH2094027: SunEC runtime permission for FIPS - * RH2036462: sun.security.pkcs11.wrapper.PKCS11.getInstance breakage - * RH2090378: Revert to disabling system security properties and FIPS mode support together - Rebase RH1648249 nss.cfg patch so it applies after the FIPS patch - Enable system security properties in the RPM (now disabled by default in the FIPS repo) - Improve security properties test to check both enabled and disabled behaviour - Run security properties test with property debugging on - Turn on system security properties as part of the build's install section - Move cacerts replacement to install section and retain original of this and tzdb.dat - Run tests on the installed image, rather than the build image - Introduce variables to refer to the static library installation directories - Use relative symlinks so they work within the image - Run debug symbols check during build stage, before the install strips them - Resolves: rhbz#2084779 - Resolves: rhbz#2099919 - Resolves: rhbz#2107943 - Resolves: rhbz#2107941 - Resolves: rhbz#2106523 [1:17.0.4.0.1-0.2.ea] - Fix issue where CheckVendor.java test erroneously passes when it should fail. - Add proper quoting so '&' is not treated as a special character by the shell. - Related: rhbz#2084779 [1:17.0.3.0.7-2] - RH2007331: SecretKey generate/import operations don't add the CKA_SIGN attribute in FIPS mode - Resolves: rhbz#2105395

i386

x86_64

java-17-openjdk-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-demo-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-devel-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-headless-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-javadoc-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-jmods-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-src-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-static-libs-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0.x86_64.rpm java-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0.x86_64.rpm aarch64: java-17-openjdk-17.0.4.0.8-2.el9_0.aarch64.rpm java-17-openjdk-demo-17.0.4.0.8-2.el9_0.aarch64.rpm java-17-openjdk-devel-17.0.4.0.8-2.el9_0.aarch64.rpm java-17-openjdk-headless-17.0.4.0.8-2.el9_0.aarch64.rpm java-17-openjdk-javadoc-17.0.4.0.8-2.el9_0.aarch64.rpm java-17-openjdk-javadoc-zip-17.0.4.0.8-2.el9_0.aarch64.rpm java-17-openjdk-jmods-17.0.4.0.8-2.el9_0.aarch64.rpm java-17-openjdk-src-17.0.4.0.8-2.el9_0.aarch64.rpm java-17-openjdk-static-libs-17.0.4.0.8-2.el9_0.aarch64.rpm java-17-openjdk-demo-fastdebug-17.0.4.0.8-2.el9_0.aarch64.rpm java-17-openjdk-demo-slowdebug-17.0.4.0.8-2.el9_0.aarch64.rpm java-17-openjdk-devel-fastdebug-17.0.4.0.8-2.el9_0.aarch64.rpm java-17-openjdk-devel-slowdebug-17.0.4.0.8-2.el9_0.aarch64.rpm java-17-openjdk-fastdebug-17.0.4.0.8-2.el9_0.aarch64.rpm java-17-openjdk-headless-fastdebug-17.0.4.0.8-2.el9_0.aarch64.rpm java-17-openjdk-headless-slowdebug-17.0.4.0.8-2.el9_0.aarch64.rpm java-17-openjdk-jmods-fastdebug-17.0.4.0.8-2.el9_0.aarch64.rpm java-17-openjdk-jmods-slowdebug-17.0.4.0.8-2.el9_0.aarch64.rpm java-17-openjdk-slowdebug-17.0.4.0.8-2.el9_0.aarch64.rpm java-17-openjdk-src-fastdebug-17.0.4.0.8-2.el9_0.aarch64.rpm java-17-openjdk-src-slowdebug-17.0.4.0.8-2.el9_0.aarch64.rpm java-17-openjdk-static-libs-fastdebug-17.0.4.0.8-2.el9_0.aarch64.rpm java-17-openjdk-static-libs-slowdebug-17.0.4.0.8-2.el9_0.aarch64.rpm

SRPMS

https://oss.oracle.com/ol9/SRPMS-updates/java-17-openjdk-17.0.4.0.8-2.el9_0.src.rpm

Severity
Related CVEs: CVE-2022-21540 CVE-2022-21541 CVE-2022-21549 CVE-2022-34169

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.