[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256148

 
 

909

 
 

199106

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2022:5736-01 -- Redhat java-17-openjdk

ID: oval:org.secpod.oval:def:507097Date: (C)2022-08-09   (M)2024-02-19
Class: PATCHFamily: unix




The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. The following packages have been upgraded to a later upstream version: java-17-openjdk . Security Fix: * OpenJDK: integer truncation issue in Xalan-J * OpenJDK: class compilation issue * OpenJDK: improper restriction of MethodHandle.invokeBasic * OpenJDK: random exponentials issue For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Bug Fix: * Previous Red Hat builds of OpenJDK 17 altered the arguments passed to sun.security.pkcs11.wrapper.PKCS11.getInstance in order to facilitate FIPS support. This build adds an additional form of the method, retaining the original arguments, so that applications which depend on this internal method continue to function with Red Hat builds of OpenJDK. * With previous Red Hat builds of OpenJDK 17, Mac key generation and import would fail due to the lack of the CKA_SIGN attribute on the key. This attribute is now added as part of the NSS FIPS configuration. * With the release of Red Hat Enterprise Linux 8.6, a change was made so that disabling OpenJDK FIPS mode required the use of both the - -Djava.security.disableSystemPropertiesFile=true and - -Dcom.redhat.fips=false options, with the intention that FIPS mode could be controlled independently of system security properties. This change has now been reverted and only -Djava.security.disableSystemPropertiesFile=true is required to disable FIPS mode, as in Red Hat Enterprise Linux 8.4. * Previous Red Hat builds of OpenJDK 17 running in FIPS mode with a SecurityManager would fail due to a lack of module access permissions. This has now been corrected

Platform:
Red Hat Enterprise Linux 9
Product:
java-17-openjdk
Reference:
RHSA-2022:5736-01
CVE-2022-21540
CVE-2022-21541
CVE-2022-21549
CVE-2022-34169
CVE    4
CVE-2022-21549
CVE-2022-21541
CVE-2022-21540
CVE-2022-34169
...

© SecPod Technologies