Описание
ELSA-2022-7470: pki-core:10.6 and pki-deps:10.6 security and bug fix update (IMPORTANT)
apache-commons-collections apache-commons-net [3.6-3]
[3.6-2]
[3.6-1]
- Update to upstream version 3.6
jss [4.9.4-1]
- Rebase to JSS 4.9.4
- Bug 2013674 - JSS cannot be properly initialized after using another NSS-backed security provider
ldapjdk [4.23.0-1]
- Rebase to LDAP SDK 4.23.0
[4.23.0-0.1]
- Rebase to LDAP SDK 4.23.0-alpha1
pki-core [10.12.0-4.0.1]
- Remove upstream reference.
[10.12.0-4]
- Bug 2107334 - CVE-2022-2414 access to external entities when parsing XML can lead to XXE
- Rename packages to idm-pki
[10.12.0-3]
- ExcludeArch i686 as md2man not available in RHEL 8.7
[10.12.0-2]
- Bug 2027470 - pki-healthcheck ClonesConnectivyAndDataCheck fails
[10.12.0-0.1]
- Rebase to PKI 10.12.0
- Bug 1904112 - pki fails to start if empty dir /var/lib/pki/pki-tomcat/kra exists
- Bug 1984455 - [RFE] Date Format on the TPS Agent Page
- Bug 1980378 - keyctl_search: Required key not available message when running ipa-healthcheck
- Bug 2004084 - Reinstall of the same ipa-replica fails with RuntimeError: CA configuration failed.
- Bug 2006070 - Upgrades incorrectly add secret attribute to connectors
pki-servlet-engine [1:9.0.50-1]
- Update to JWS 5.6.1 distribution
- Resolves: rhbz#2057162 Rebase pki-servlet-engine to 9.0.50
resteasy [3.0.26-6]
- CVE-2020-1695: Improper validation of response header in MediaTypeHeaderDelegate.java class Resolves: rh-bz#1845548
tomcatjss [7.7.1-1]
- Rebase to TomcatJSS 7.7.1
xml-commons-apis [1.4.01-25]
[1.4.01-24]
- Elimitate race condition when injecting JAR manifest
- Resolves: rhbz#1495249
[1.4.01-23]
[1.4.01-22]
- Update to current packaging guidelines
[1.4.01-21]
[1.4.01-20]
[1.4.01-19]
[1.4.01-18]
[1.4.01-17]
- Dont generate duplicate Maven metadata
[1.4.01-16]
- Use .mfiles generated during build
[1.4.01-15]
- Use Requires: java-headless rebuild (#1067528)
[1.4.01-14]
- Fix FTBFS.
[1.4.01-13]
[1.4.01-12]
- Update manifest to match Eclipse version (Resolved: rhbz#964039).
[1.4.01-11]
- Add Require-Bundle: system.bundle to manifest
- Resolves: rhbz#917659
[1.4.01-10]
[1.4.01-9]
- Add additional maven depmap
[1.4.01-8]
- Remove osgi(system.bundle) requirement from manifest
[1.4.01-7]
[1.4.01-6]
[1.4.01-5]
- Add missing packages to manifest - javax.xml.stream, javax.xml.stream.events, javax.xml.stream.util, javax.xml.transform.stax (bug #743360)
[1.4.01-4]
- Add maven metadata
- Few guidelines tweaks (buildroot, clean, defattr)
- Versionless jars & javadocs
[1.4.01-3]
[1.4.01-2]
- Fix FTBFS and rpmlint warnings.
- Dont package javadoc in manual package.
[0:1.4.01-1]
- Update to 1.4.01.
Обновленные пакеты
Oracle Linux 8
Oracle Linux aarch64
Module pki-core:10.6 is enabled
idm-pki-acme
10.12.0-4.0.1.module+el8.7.0+20845+c5918a27
idm-pki-base
10.12.0-4.0.1.module+el8.7.0+20845+c5918a27
idm-pki-base-java
10.12.0-4.0.1.module+el8.7.0+20845+c5918a27
idm-pki-ca
10.12.0-4.0.1.module+el8.7.0+20845+c5918a27
idm-pki-kra
10.12.0-4.0.1.module+el8.7.0+20845+c5918a27
idm-pki-server
10.12.0-4.0.1.module+el8.7.0+20845+c5918a27
idm-pki-symkey
10.12.0-4.0.1.module+el8.7.0+20845+c5918a27
idm-pki-tools
10.12.0-4.0.1.module+el8.7.0+20845+c5918a27
jss
4.9.4-1.module+el8.7.0+20845+c5918a27
jss-javadoc
4.9.4-1.module+el8.7.0+20845+c5918a27
ldapjdk
4.23.0-1.module+el8.5.0+20349+9cc212a8
ldapjdk-javadoc
4.23.0-1.module+el8.5.0+20349+9cc212a8
python3-idm-pki
10.12.0-4.0.1.module+el8.7.0+20845+c5918a27
tomcatjss
7.7.1-1.module+el8.6.0+20558+60d461b7
Module pki-deps:10.6 is enabled
apache-commons-collections
3.2.2-10.module+el8.3.0+7697+44932688
apache-commons-lang
2.6-21.module+el8.3.0+7697+44932688
apache-commons-net
3.6-3.module+el8.3.0+7697+44932688
bea-stax-api
1.2.0-16.module+el8.3.0+7697+44932688
glassfish-fastinfoset
1.2.13-9.module+el8.3.0+7697+44932688
glassfish-jaxb-api
2.2.12-8.module+el8.3.0+7697+44932688
glassfish-jaxb-core
2.2.11-11.module+el8.3.0+7697+44932688
glassfish-jaxb-runtime
2.2.11-11.module+el8.3.0+7697+44932688
glassfish-jaxb-txw2
2.2.11-11.module+el8.3.0+7697+44932688
jackson-annotations
2.10.0-1.module+el8.3.0+7697+44932688
jackson-core
2.10.0-1.module+el8.3.0+7697+44932688
jackson-databind
2.10.0-1.module+el8.3.0+7697+44932688
jackson-jaxrs-json-provider
2.9.9-1.module+el8.3.0+7697+44932688
jackson-jaxrs-providers
2.9.9-1.module+el8.3.0+7697+44932688
jackson-module-jaxb-annotations
2.7.6-4.module+el8.3.0+7697+44932688
jakarta-commons-httpclient
3.1-28.module+el8.3.0+7697+44932688
javassist
3.18.1-8.module+el8.3.0+7697+44932688
javassist-javadoc
3.18.1-8.module+el8.3.0+7697+44932688
pki-servlet-4.0-api
9.0.50-1.module+el8.7.0+20772+f86c9a56
pki-servlet-engine
9.0.50-1.module+el8.7.0+20772+f86c9a56
python-nss-doc
1.0.1-10.module+el8.3.0+7697+44932688
python3-nss
1.0.1-10.module+el8.3.0+7697+44932688
relaxngDatatype
2011.1-7.module+el8.3.0+7697+44932688
resteasy
3.0.26-6.module+el8.4.0+20041+bb8828ef
slf4j
1.7.25-4.module+el8.3.0+7697+44932688
slf4j-jdk14
1.7.25-4.module+el8.3.0+7697+44932688
stax-ex
1.7.7-8.module+el8.3.0+7697+44932688
velocity
1.7-24.module+el8.3.0+7697+44932688
xalan-j2
2.7.1-38.module+el8.3.0+7697+44932688
xerces-j2
2.11.0-34.module+el8.3.0+7697+44932688
xml-commons-apis
1.4.01-25.module+el8.3.0+7697+44932688
xml-commons-resolver
1.2-26.module+el8.3.0+7697+44932688
xmlstreambuffer
1.5.4-8.module+el8.3.0+7697+44932688
xsom
0-19.20110809svn.module+el8.3.0+7697+44932688
Oracle Linux x86_64
Module pki-core:10.6 is enabled
idm-pki-acme
10.12.0-4.0.1.module+el8.7.0+20845+c5918a27
idm-pki-base
10.12.0-4.0.1.module+el8.7.0+20845+c5918a27
idm-pki-base-java
10.12.0-4.0.1.module+el8.7.0+20845+c5918a27
idm-pki-ca
10.12.0-4.0.1.module+el8.7.0+20845+c5918a27
idm-pki-kra
10.12.0-4.0.1.module+el8.7.0+20845+c5918a27
idm-pki-server
10.12.0-4.0.1.module+el8.7.0+20845+c5918a27
idm-pki-symkey
10.12.0-4.0.1.module+el8.7.0+20845+c5918a27
idm-pki-tools
10.12.0-4.0.1.module+el8.7.0+20845+c5918a27
jss
4.9.4-1.module+el8.7.0+20845+c5918a27
jss-javadoc
4.9.4-1.module+el8.7.0+20845+c5918a27
ldapjdk
4.23.0-1.module+el8.5.0+20349+9cc212a8
ldapjdk-javadoc
4.23.0-1.module+el8.5.0+20349+9cc212a8
python3-idm-pki
10.12.0-4.0.1.module+el8.7.0+20845+c5918a27
tomcatjss
7.7.1-1.module+el8.6.0+20558+60d461b7
Module pki-deps:10.6 is enabled
apache-commons-collections
3.2.2-10.module+el8.3.0+7697+44932688
apache-commons-lang
2.6-21.module+el8.3.0+7697+44932688
apache-commons-net
3.6-3.module+el8.3.0+7697+44932688
bea-stax-api
1.2.0-16.module+el8.3.0+7697+44932688
glassfish-fastinfoset
1.2.13-9.module+el8.3.0+7697+44932688
glassfish-jaxb-api
2.2.12-8.module+el8.3.0+7697+44932688
glassfish-jaxb-core
2.2.11-11.module+el8.3.0+7697+44932688
glassfish-jaxb-runtime
2.2.11-11.module+el8.3.0+7697+44932688
glassfish-jaxb-txw2
2.2.11-11.module+el8.3.0+7697+44932688
jackson-annotations
2.10.0-1.module+el8.3.0+7697+44932688
jackson-core
2.10.0-1.module+el8.3.0+7697+44932688
jackson-databind
2.10.0-1.module+el8.3.0+7697+44932688
jackson-jaxrs-json-provider
2.9.9-1.module+el8.3.0+7697+44932688
jackson-jaxrs-providers
2.9.9-1.module+el8.3.0+7697+44932688
jackson-module-jaxb-annotations
2.7.6-4.module+el8.3.0+7697+44932688
jakarta-commons-httpclient
3.1-28.module+el8.3.0+7697+44932688
javassist
3.18.1-8.module+el8.3.0+7697+44932688
javassist-javadoc
3.18.1-8.module+el8.3.0+7697+44932688
pki-servlet-4.0-api
9.0.50-1.module+el8.7.0+20772+f86c9a56
pki-servlet-engine
9.0.50-1.module+el8.7.0+20772+f86c9a56
python-nss-doc
1.0.1-10.module+el8.3.0+7697+44932688
python3-nss
1.0.1-10.module+el8.3.0+7697+44932688
relaxngDatatype
2011.1-7.module+el8.3.0+7697+44932688
resteasy
3.0.26-6.module+el8.4.0+20041+bb8828ef
slf4j
1.7.25-4.module+el8.3.0+7697+44932688
slf4j-jdk14
1.7.25-4.module+el8.3.0+7697+44932688
stax-ex
1.7.7-8.module+el8.3.0+7697+44932688
velocity
1.7-24.module+el8.3.0+7697+44932688
xalan-j2
2.7.1-38.module+el8.3.0+7697+44932688
xerces-j2
2.11.0-34.module+el8.3.0+7697+44932688
xml-commons-apis
1.4.01-25.module+el8.3.0+7697+44932688
xml-commons-resolver
1.2-26.module+el8.3.0+7697+44932688
xmlstreambuffer
1.5.4-8.module+el8.3.0+7697+44932688
xsom
0-19.20110809svn.module+el8.3.0+7697+44932688
Связанные CVE
Связанные уязвимости
Access to external entities when parsing XML documents can lead to XML external entity (XXE) attacks. This flaw allows a remote attacker to potentially retrieve the content of arbitrary files by sending specially crafted HTTP requests.
Access to external entities when parsing XML documents can lead to XML external entity (XXE) attacks. This flaw allows a remote attacker to potentially retrieve the content of arbitrary files by sending specially crafted HTTP requests.
Access to external entities when parsing XML documents can lead to XML external entity (XXE) attacks. This flaw allows a remote attacker to potentially retrieve the content of arbitrary files by sending specially crafted HTTP requests.
Access to external entities when parsing XML documents can lead to XML ...