Category Archives: Advisories

java-1.8.0-openjdk-1.8.0.342.b07-1.fc35

Read Time:1 Minute, 21 Second

FEDORA-2022-80afe2304a

Packages in this update:

java-1.8.0-openjdk-1.8.0.342.b07-1.fc35

Update description:

New in release OpenJDK 8u342 (2022-07-19)

The release announcement can be found at: https://bitly.com/openjdk8u342
Full release details can be found at https://builds.shipilev.net/backports-monitor/release-notes-openjdk8u342.txt

Security Fixes

JDK-8272243: Improve DER parsing
JDK-8272249: Better properties of loaded Properties
JDK-8277608: Address IP Addressing
JDK-8281859, CVE-2022-21540: Improve class compilation
JDK-8281866, CVE-2022-21541: Enhance MethodHandle invocations
JDK-8283190: Improve MIDI processing
JDK-8284370: Improve zlib usage
JDK-8285407, CVE-2022-34169: Improve Xalan supports

FIPS Changes

RH2007331: SecretKey generate/import operations don’t add the CKA_SIGN attribute in FIPS mode
RH2051605: Detect NSS at Runtime for FIPS detection
RH2036462: sun.security.pkcs11.wrapper.PKCS11.getInstance breakage
RH2090378: Revert to disabling system security properties and FIPS mode support together
Depend on crypto-policies package at build-time and run-time

Other Changes

Add javaver- and origin-specific javadoc and javadoczip alternatives (thanks to FeRD (Frank Dana) ferdnyc@gmail.com)

JDK-8215293: Customizing PKCS12 keystore Generation

New system and security properties have been added to enable users to customize the generation of PKCS #12 keystores. This includes algorithms and parameters for key protection, certificate protection, and MacData. The detailed explanation and possible values for these properties can be found in the “PKCS12 KeyStore properties” section of the java.security file.

Also, support for the following SHA-2 based HmacPBE algorithms has been added to the SunJCE provider:

HmacPBESHA224
HmacPBESHA256
HmacPBESHA384
HmacPBESHA512
HmacPBESHA512/224
HmacPBESHA512/256

Read More

java-1.8.0-openjdk-1.8.0.342.b07-1.fc36

Read Time:1 Minute, 21 Second

FEDORA-2022-19b6f21746

Packages in this update:

java-1.8.0-openjdk-1.8.0.342.b07-1.fc36

Update description:

New in release OpenJDK 8u342 (2022-07-19)

The release announcement can be found at: https://bitly.com/openjdk8u342
Full release details can be found at https://builds.shipilev.net/backports-monitor/release-notes-openjdk8u342.txt

Security Fixes

JDK-8272243: Improve DER parsing
JDK-8272249: Better properties of loaded Properties
JDK-8277608: Address IP Addressing
JDK-8281859, CVE-2022-21540: Improve class compilation
JDK-8281866, CVE-2022-21541: Enhance MethodHandle invocations
JDK-8283190: Improve MIDI processing
JDK-8284370: Improve zlib usage
JDK-8285407, CVE-2022-34169: Improve Xalan supports

FIPS Changes

RH2007331: SecretKey generate/import operations don’t add the CKA_SIGN attribute in FIPS mode
RH2051605: Detect NSS at Runtime for FIPS detection
RH2036462: sun.security.pkcs11.wrapper.PKCS11.getInstance breakage
RH2090378: Revert to disabling system security properties and FIPS mode support together
Depend on crypto-policies package at build-time and run-time

Other Changes

Add javaver- and origin-specific javadoc and javadoczip alternatives (thanks to FeRD (Frank Dana) ferdnyc@gmail.com)

JDK-8215293: Customizing PKCS12 keystore Generation

New system and security properties have been added to enable users to customize the generation of PKCS #12 keystores. This includes algorithms and parameters for key protection, certificate protection, and MacData. The detailed explanation and possible values for these properties can be found in the “PKCS12 KeyStore properties” section of the java.security file.

Also, support for the following SHA-2 based HmacPBE algorithms has been added to the SunJCE provider:

HmacPBESHA224
HmacPBESHA256
HmacPBESHA384
HmacPBESHA512
HmacPBESHA512/224
HmacPBESHA512/256

Read More

CVE-2020-28441

Read Time:13 Second

This affects the package conf-cfg-ini before 1.2.2. If an attacker submits a malicious INI file to an application that parses it with decode, they will pollute the prototype on the application. This can be exploited further depending on the context.

Read More