FEDORA-2022-6d129f14f2
Packages in this update:
ceph-16.2.10-1.fc35
Update description:
ceph 16.2.10 GA
Security fix for CVE-2022-0670
ceph-16.2.10-1.fc35
ceph 16.2.10 GA
Security fix for CVE-2022-0670
java-1.8.0-openjdk-1.8.0.342.b07-1.fc35
The release announcement can be found at: https://bitly.com/openjdk8u342
Full release details can be found at https://builds.shipilev.net/backports-monitor/release-notes-openjdk8u342.txt
JDK-8272243: Improve DER parsing
JDK-8272249: Better properties of loaded Properties
JDK-8277608: Address IP Addressing
JDK-8281859, CVE-2022-21540: Improve class compilation
JDK-8281866, CVE-2022-21541: Enhance MethodHandle invocations
JDK-8283190: Improve MIDI processing
JDK-8284370: Improve zlib usage
JDK-8285407, CVE-2022-34169: Improve Xalan supports
RH2007331: SecretKey generate/import operations don’t add the CKA_SIGN attribute in FIPS mode
RH2051605: Detect NSS at Runtime for FIPS detection
RH2036462: sun.security.pkcs11.wrapper.PKCS11.getInstance breakage
RH2090378: Revert to disabling system security properties and FIPS mode support together
Depend on crypto-policies package at build-time and run-time
Add javaver- and origin-specific javadoc and javadoczip alternatives (thanks to FeRD (Frank Dana) ferdnyc@gmail.com)
New system and security properties have been added to enable users to customize the generation of PKCS #12 keystores. This includes algorithms and parameters for key protection, certificate protection, and MacData. The detailed explanation and possible values for these properties can be found in the “PKCS12 KeyStore properties” section of the java.security file.
Also, support for the following SHA-2 based HmacPBE algorithms has been added to the SunJCE provider:
HmacPBESHA224
HmacPBESHA256
HmacPBESHA384
HmacPBESHA512
HmacPBESHA512/224
HmacPBESHA512/256
java-1.8.0-openjdk-1.8.0.342.b07-1.fc36
The release announcement can be found at: https://bitly.com/openjdk8u342
Full release details can be found at https://builds.shipilev.net/backports-monitor/release-notes-openjdk8u342.txt
JDK-8272243: Improve DER parsing
JDK-8272249: Better properties of loaded Properties
JDK-8277608: Address IP Addressing
JDK-8281859, CVE-2022-21540: Improve class compilation
JDK-8281866, CVE-2022-21541: Enhance MethodHandle invocations
JDK-8283190: Improve MIDI processing
JDK-8284370: Improve zlib usage
JDK-8285407, CVE-2022-34169: Improve Xalan supports
RH2007331: SecretKey generate/import operations don’t add the CKA_SIGN attribute in FIPS mode
RH2051605: Detect NSS at Runtime for FIPS detection
RH2036462: sun.security.pkcs11.wrapper.PKCS11.getInstance breakage
RH2090378: Revert to disabling system security properties and FIPS mode support together
Depend on crypto-policies package at build-time and run-time
Add javaver- and origin-specific javadoc and javadoczip alternatives (thanks to FeRD (Frank Dana) ferdnyc@gmail.com)
New system and security properties have been added to enable users to customize the generation of PKCS #12 keystores. This includes algorithms and parameters for key protection, certificate protection, and MacData. The detailed explanation and possible values for these properties can be found in the “PKCS12 KeyStore properties” section of the java.security file.
Also, support for the following SHA-2 based HmacPBE algorithms has been added to the SunJCE provider:
HmacPBESHA224
HmacPBESHA256
HmacPBESHA384
HmacPBESHA512
HmacPBESHA512/224
HmacPBESHA512/256
This affects all versions of package ffmpeg-sdk. The injection point is located in line 9 in index.js.
This affects all versions of package deferred-exec. The injection point is located in line 42 in lib/deferred-exec.js
This affects the package conf-cfg-ini before 1.2.2. If an attacker submits a malicious INI file to an application that parses it with decode, they will pollute the prototype on the application. This can be exploited further depending on the context.
This affects all versions of package sonar-wrapper. The injection point is located in lib/sonarRunner.js.
This affects all versions of package npm-help. The injection point is located in line 13 in index.js file in export.latestVersion() function.
All versions of package git-archive are vulnerable to Command Injection via the exports function.