Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2022:0306: Red Hat Security Advisory: java-1.8.0-openjdk security update

An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

Related CVEs:

  • CVE-2022-21248: OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934)
  • CVE-2022-21282: OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492)
  • CVE-2022-21283: OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813)
  • CVE-2022-21293: OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392)
  • CVE-2022-21294: OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416)
  • CVE-2022-21296: OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498)
  • CVE-2022-21299: OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646)
  • CVE-2022-21305: OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014)
  • CVE-2022-21340: OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026)
  • CVE-2022-21341: OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236)
  • CVE-2022-21360: OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756)
  • CVE-2022-21365: OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838)
Red Hat Security Data
#vulnerability#linux#red_hat#java

Synopsis

Moderate: java-1.8.0-openjdk security update

Type/Severity

Security Advisory: Moderate

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

  • OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) (CVE-2022-21248)
  • OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) (CVE-2022-21282)
  • OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) (CVE-2022-21283)
  • OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) (CVE-2022-21293)
  • OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) (CVE-2022-21294)
  • OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) (CVE-2022-21296)
  • OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) (CVE-2022-21299)
  • OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) (CVE-2022-21305)
  • OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) (CVE-2022-21340)
  • OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) (CVE-2022-21341)
  • OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) (CVE-2022-21360)
  • OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) (CVE-2022-21365)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

All running instances of OpenJDK Java must be restarted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server 7 x86_64
  • Red Hat Enterprise Linux Workstation 7 x86_64
  • Red Hat Enterprise Linux Desktop 7 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 7 s390x
  • Red Hat Enterprise Linux for Power, big endian 7 ppc64
  • Red Hat Enterprise Linux for Scientific Computing 7 x86_64
  • Red Hat Enterprise Linux for Power, little endian 7 ppc64le

Fixes

  • BZ - 2022809 - Prepare for the next quarterly OpenJDK upstream release (2022-01, 8u322) [rhel-7]
  • BZ - 2041400 - CVE-2022-21283 OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813)
  • BZ - 2041417 - CVE-2022-21293 OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392)
  • BZ - 2041427 - CVE-2022-21294 OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416)
  • BZ - 2041435 - CVE-2022-21282 OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492)
  • BZ - 2041439 - CVE-2022-21296 OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498)
  • BZ - 2041472 - CVE-2022-21299 OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646)
  • BZ - 2041491 - CVE-2022-21360 OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756)
  • BZ - 2041785 - CVE-2022-21365 OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838)
  • BZ - 2041801 - CVE-2022-21248 OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934)
  • BZ - 2041878 - CVE-2022-21305 OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014)
  • BZ - 2041884 - CVE-2022-21340 OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026)
  • BZ - 2041897 - CVE-2022-21341 OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236)

CVEs

  • CVE-2022-21248
  • CVE-2022-21282
  • CVE-2022-21283
  • CVE-2022-21293
  • CVE-2022-21294
  • CVE-2022-21296
  • CVE-2022-21299
  • CVE-2022-21305
  • CVE-2022-21340
  • CVE-2022-21341
  • CVE-2022-21360
  • CVE-2022-21365

Red Hat Enterprise Linux Server 7

SRPM

java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm

SHA-256: e0d17b1426a37799a4d34bea17987cdcd0773be9e936ed8127d0e57568fb1fc3

x86_64

java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: 14b95aa4d9655b66bd0c55398ab4b8d79c20cb34a760c13937d3ef8717431a2a

java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 1e8592738c4b558a1a82cac028d79d66bf1b0b17f28519bc82072c3aa1fdc74c

java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: 581b861322bf85e3c84852a561dffbde6d03481f8868fa345ea3dcdc4ee41fd4

java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 523d90d07179a4482f9a7f2196ca14e7d63bb9babab876261974e2ba1db4d840

java-1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: 67e6c51420f9d33e464cf217807d093933a6c5e697ed1af8954b95421b9d8660

java-1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: 67e6c51420f9d33e464cf217807d093933a6c5e697ed1af8954b95421b9d8660

java-1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 0a14961315d1cfb9de14b02cbe3841b53a4293911c178e3140be1e305692a765

java-1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 0a14961315d1cfb9de14b02cbe3841b53a4293911c178e3140be1e305692a765

java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: 505e7b4329636c34608300cf6a55add8dbf193969f63ab1f1ea39e4325d935e1

java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: d1fa843f76c8d6382d0ae002f96327ab9e2e54f930b7fee32d16c8a4e89ceed6

java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: f7ef435a2f6628fd2c9876a88c8959e1e294bc2b0ebe72d42e683e955467d084

java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 9528ad9a5e4154bd0d431bc920409de3a62ceaf20ed7bbe1bcaffc4b079e469c

java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: cf14d0488b570c8fc8b68eb9a8fc72fe5a883553327cbbb5af41832441d659c8

java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 6c11291c341e9bc5b3f81c971dda564a273b7ef88198bcd351a3f7c0eedd6f38

java-1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el7_9.noarch.rpm

SHA-256: 3b9d867056c6b11d6487a49cfc051883be65aaa98a9a607c9a2b0f9442c41f64

java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el7_9.noarch.rpm

SHA-256: b0a609b9a0d9606a5ec8e3f6223420a9605ab316547650747122f0b9c30632c6

java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: 8a6b10a637b5ea33a154f60e85e25a022a3ef0239ff39e2a15b17faef000c034

java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 7f8536501714aba09b463d877dfcd75db44e938735143d9d070f94444837c9c2

Red Hat Enterprise Linux Workstation 7

SRPM

java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm

SHA-256: e0d17b1426a37799a4d34bea17987cdcd0773be9e936ed8127d0e57568fb1fc3

x86_64

java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: 14b95aa4d9655b66bd0c55398ab4b8d79c20cb34a760c13937d3ef8717431a2a

java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 1e8592738c4b558a1a82cac028d79d66bf1b0b17f28519bc82072c3aa1fdc74c

java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: 581b861322bf85e3c84852a561dffbde6d03481f8868fa345ea3dcdc4ee41fd4

java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 523d90d07179a4482f9a7f2196ca14e7d63bb9babab876261974e2ba1db4d840

java-1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: 67e6c51420f9d33e464cf217807d093933a6c5e697ed1af8954b95421b9d8660

java-1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: 67e6c51420f9d33e464cf217807d093933a6c5e697ed1af8954b95421b9d8660

java-1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 0a14961315d1cfb9de14b02cbe3841b53a4293911c178e3140be1e305692a765

java-1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 0a14961315d1cfb9de14b02cbe3841b53a4293911c178e3140be1e305692a765

java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: 505e7b4329636c34608300cf6a55add8dbf193969f63ab1f1ea39e4325d935e1

java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: d1fa843f76c8d6382d0ae002f96327ab9e2e54f930b7fee32d16c8a4e89ceed6

java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: f7ef435a2f6628fd2c9876a88c8959e1e294bc2b0ebe72d42e683e955467d084

java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 9528ad9a5e4154bd0d431bc920409de3a62ceaf20ed7bbe1bcaffc4b079e469c

java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: cf14d0488b570c8fc8b68eb9a8fc72fe5a883553327cbbb5af41832441d659c8

java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 6c11291c341e9bc5b3f81c971dda564a273b7ef88198bcd351a3f7c0eedd6f38

java-1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el7_9.noarch.rpm

SHA-256: 3b9d867056c6b11d6487a49cfc051883be65aaa98a9a607c9a2b0f9442c41f64

java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el7_9.noarch.rpm

SHA-256: b0a609b9a0d9606a5ec8e3f6223420a9605ab316547650747122f0b9c30632c6

java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: 8a6b10a637b5ea33a154f60e85e25a022a3ef0239ff39e2a15b17faef000c034

java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 7f8536501714aba09b463d877dfcd75db44e938735143d9d070f94444837c9c2

Red Hat Enterprise Linux Desktop 7

SRPM

java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm

SHA-256: e0d17b1426a37799a4d34bea17987cdcd0773be9e936ed8127d0e57568fb1fc3

x86_64

java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: 14b95aa4d9655b66bd0c55398ab4b8d79c20cb34a760c13937d3ef8717431a2a

java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 1e8592738c4b558a1a82cac028d79d66bf1b0b17f28519bc82072c3aa1fdc74c

java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: 581b861322bf85e3c84852a561dffbde6d03481f8868fa345ea3dcdc4ee41fd4

java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 523d90d07179a4482f9a7f2196ca14e7d63bb9babab876261974e2ba1db4d840

java-1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: 67e6c51420f9d33e464cf217807d093933a6c5e697ed1af8954b95421b9d8660

java-1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: 67e6c51420f9d33e464cf217807d093933a6c5e697ed1af8954b95421b9d8660

java-1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 0a14961315d1cfb9de14b02cbe3841b53a4293911c178e3140be1e305692a765

java-1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 0a14961315d1cfb9de14b02cbe3841b53a4293911c178e3140be1e305692a765

java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: 505e7b4329636c34608300cf6a55add8dbf193969f63ab1f1ea39e4325d935e1

java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: d1fa843f76c8d6382d0ae002f96327ab9e2e54f930b7fee32d16c8a4e89ceed6

java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: f7ef435a2f6628fd2c9876a88c8959e1e294bc2b0ebe72d42e683e955467d084

java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 9528ad9a5e4154bd0d431bc920409de3a62ceaf20ed7bbe1bcaffc4b079e469c

java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: cf14d0488b570c8fc8b68eb9a8fc72fe5a883553327cbbb5af41832441d659c8

java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 6c11291c341e9bc5b3f81c971dda564a273b7ef88198bcd351a3f7c0eedd6f38

java-1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el7_9.noarch.rpm

SHA-256: 3b9d867056c6b11d6487a49cfc051883be65aaa98a9a607c9a2b0f9442c41f64

java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el7_9.noarch.rpm

SHA-256: b0a609b9a0d9606a5ec8e3f6223420a9605ab316547650747122f0b9c30632c6

java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: 8a6b10a637b5ea33a154f60e85e25a022a3ef0239ff39e2a15b17faef000c034

java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 7f8536501714aba09b463d877dfcd75db44e938735143d9d070f94444837c9c2

Red Hat Enterprise Linux for IBM z Systems 7

SRPM

java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm

SHA-256: e0d17b1426a37799a4d34bea17987cdcd0773be9e936ed8127d0e57568fb1fc3

s390x

java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.s390x.rpm

SHA-256: ad0b45a45af83367c99549c39c42d1e120a5546bcf3ae76f0642f5e4c32f7305

java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9.s390x.rpm

SHA-256: 388080f82c6feb3c47ad82e637935488849b7099ead283f19d9af960eefdaf64

java-1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el7_9.s390x.rpm

SHA-256: d72992477f583f6b50b91eb6ffa9c56818f1c687cb6721999a0254058f72463f

java-1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el7_9.s390x.rpm

SHA-256: d72992477f583f6b50b91eb6ffa9c56818f1c687cb6721999a0254058f72463f

java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9.s390x.rpm

SHA-256: 40a914c38616e3a5fd59e0eaec9fd3d8d5e58a5fb725da71b3a3660b6a2dfe7d

java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9.s390x.rpm

SHA-256: 54203d0b35382ebda3e6ddba4f6012f26a07b59e83694e728b63cc756bea9723

java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9.s390x.rpm

SHA-256: 43c979937e1f553c718ae12225e4b6569a3935f8f11b1afcd38b57cb86a3feb1

java-1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el7_9.noarch.rpm

SHA-256: 3b9d867056c6b11d6487a49cfc051883be65aaa98a9a607c9a2b0f9442c41f64

java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el7_9.noarch.rpm

SHA-256: b0a609b9a0d9606a5ec8e3f6223420a9605ab316547650747122f0b9c30632c6

java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9.s390x.rpm

SHA-256: 3a34bdf7df2a739606be589f8a31f6273f32f8c56a341d34861428be44b39252

Red Hat Enterprise Linux for Power, big endian 7

SRPM

java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm

SHA-256: e0d17b1426a37799a4d34bea17987cdcd0773be9e936ed8127d0e57568fb1fc3

ppc64

java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.ppc64.rpm

SHA-256: 0f8e3c1c03094c02b3d71bcf473264b3ef91bda3126baf36e91f4bce54af3bcd

java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9.ppc64.rpm

SHA-256: fdc5ea518ac1e0e9909a512d7feb97839fb5add3d9339505a158f37e17f4d0cf

java-1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el7_9.ppc64.rpm

SHA-256: 675fec976079fc54ad113be870ea7629518b7dab9811a73ed2b553f692469a72

java-1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el7_9.ppc64.rpm

SHA-256: 675fec976079fc54ad113be870ea7629518b7dab9811a73ed2b553f692469a72

java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9.ppc64.rpm

SHA-256: 42560209bee3252cecb2a5918b7e414655cdbcf687f1f4b261a19f14b021f637

java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9.ppc64.rpm

SHA-256: 21ed382ac841173f90f16c6b466ebdf598f795a1a6484ae212d539e4be745c9c

java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9.ppc64.rpm

SHA-256: fb47d027a79ecde9a91adec80d341a691c7d7868bc6e43ddc8e8a7281f6f649c

java-1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el7_9.noarch.rpm

SHA-256: 3b9d867056c6b11d6487a49cfc051883be65aaa98a9a607c9a2b0f9442c41f64

java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el7_9.noarch.rpm

SHA-256: b0a609b9a0d9606a5ec8e3f6223420a9605ab316547650747122f0b9c30632c6

java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9.ppc64.rpm

SHA-256: 80ccc74b84aac60c1ceffd20763108d2f1e91014caf8883c916210e8fa4cf807

Red Hat Enterprise Linux for Scientific Computing 7

SRPM

java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm

SHA-256: e0d17b1426a37799a4d34bea17987cdcd0773be9e936ed8127d0e57568fb1fc3

x86_64

java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: 14b95aa4d9655b66bd0c55398ab4b8d79c20cb34a760c13937d3ef8717431a2a

java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 1e8592738c4b558a1a82cac028d79d66bf1b0b17f28519bc82072c3aa1fdc74c

java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: 581b861322bf85e3c84852a561dffbde6d03481f8868fa345ea3dcdc4ee41fd4

java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 523d90d07179a4482f9a7f2196ca14e7d63bb9babab876261974e2ba1db4d840

java-1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: 67e6c51420f9d33e464cf217807d093933a6c5e697ed1af8954b95421b9d8660

java-1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: 67e6c51420f9d33e464cf217807d093933a6c5e697ed1af8954b95421b9d8660

java-1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 0a14961315d1cfb9de14b02cbe3841b53a4293911c178e3140be1e305692a765

java-1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 0a14961315d1cfb9de14b02cbe3841b53a4293911c178e3140be1e305692a765

java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: 505e7b4329636c34608300cf6a55add8dbf193969f63ab1f1ea39e4325d935e1

java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: d1fa843f76c8d6382d0ae002f96327ab9e2e54f930b7fee32d16c8a4e89ceed6

java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: f7ef435a2f6628fd2c9876a88c8959e1e294bc2b0ebe72d42e683e955467d084

java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 9528ad9a5e4154bd0d431bc920409de3a62ceaf20ed7bbe1bcaffc4b079e469c

java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: cf14d0488b570c8fc8b68eb9a8fc72fe5a883553327cbbb5af41832441d659c8

java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 6c11291c341e9bc5b3f81c971dda564a273b7ef88198bcd351a3f7c0eedd6f38

java-1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el7_9.noarch.rpm

SHA-256: 3b9d867056c6b11d6487a49cfc051883be65aaa98a9a607c9a2b0f9442c41f64

java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el7_9.noarch.rpm

SHA-256: b0a609b9a0d9606a5ec8e3f6223420a9605ab316547650747122f0b9c30632c6

java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9.i686.rpm

SHA-256: 8a6b10a637b5ea33a154f60e85e25a022a3ef0239ff39e2a15b17faef000c034

java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9.x86_64.rpm

SHA-256: 7f8536501714aba09b463d877dfcd75db44e938735143d9d070f94444837c9c2

Red Hat Enterprise Linux for Power, little endian 7

SRPM

java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.src.rpm

SHA-256: e0d17b1426a37799a4d34bea17987cdcd0773be9e936ed8127d0e57568fb1fc3

ppc64le

java-1.8.0-openjdk-1.8.0.322.b06-1.el7_9.ppc64le.rpm

SHA-256: fb8cb11f1e50b8e0df9ac2dcfe845ce025515c47cfef735ba9efb482b1dbb203

java-1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el7_9.ppc64le.rpm

SHA-256: 25dd60c4730be6ea61d98ec02ad5efec7950b9497544b52763a94346b6049952

java-1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el7_9.ppc64le.rpm

SHA-256: 403363e9e776e51ed88a5e55a0fb04ed9be9212729249976395bbf932f1df13a

java-1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el7_9.ppc64le.rpm

SHA-256: 403363e9e776e51ed88a5e55a0fb04ed9be9212729249976395bbf932f1df13a

java-1.8.0-openjdk-demo-1.8.0.322.b06-1.el7_9.ppc64le.rpm

SHA-256: ad807bcc7f690e6ce8ac6a4b793bf3fe6bdfc4a3fdca748fff74cc1f9d78d69c

java-1.8.0-openjdk-devel-1.8.0.322.b06-1.el7_9.ppc64le.rpm

SHA-256: 4009a783299f3b0babba15a8c3885d9970ab488d2afb0e9250be1689256f5302

java-1.8.0-openjdk-headless-1.8.0.322.b06-1.el7_9.ppc64le.rpm

SHA-256: 72a28c337e081e388e67e66567ba6eed1b4d7a7619b0ed273ecee145fc76c976

java-1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el7_9.noarch.rpm

SHA-256: 3b9d867056c6b11d6487a49cfc051883be65aaa98a9a607c9a2b0f9442c41f64

java-1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el7_9.noarch.rpm

SHA-256: b0a609b9a0d9606a5ec8e3f6223420a9605ab316547650747122f0b9c30632c6

java-1.8.0-openjdk-src-1.8.0.322.b06-1.el7_9.ppc64le.rpm

SHA-256: 82ca65c5d6fc038b28a864cc54d2b19cb5ddc0a6ff9e3c4ea08a01c6787d74d7

Red Hat Security Data: Latest News

RHSA-2023:5627: Red Hat Security Advisory: kernel security, bug fix, and enhancement update