Type: | BUG |
Impact: | NA |
Release Date: | 2016-12-06 |
[10.3.3-14]
- Marked the following RHCS 9.1.z bug:
Bugzilla Bug #1382862 - TPS token enrollment fails to setupSecureChannel
when TPS and TKS security db is on fips mode. (jmagne)
as a duplicate of RHEL 7.3.z bug:
Bugzilla Bug #1389757 - Problems with FIPS mode (edewata)
and moved the patch from the RHCS 9.1.z bug to the RHEL 7.3.z bug.
[10.3.3-13]
- ## RHEL 7.3.z Batch Update 1
- Bugzilla Bug #1389757 - Problems with FIPS mode (edewata)
(added KRA key recovery via CLI in FIPS mode)
- ## RHCS 9.1.z Batch Update 1
- Reverted patches associated with
Bugzilla Bug #1386257 - Changes to target.agent.approve.list parameter is
not reflected in the TPS Web UI (edewata)
[10.3.3-12]
- ## RHEL 7.3.z Batch Update 1
- Bugzilla Bug #1390318 - CA EE: Submit caUserCert request without uid does
not show proper error message (alee)
- Bugzilla Bug #1390319 - Failed to start pki-tomcatd Service
('ipa-cacert-manage renew' failed?) (edewata)
- Bugzilla Bug #1390320 - pkispawn fails as it is not able to find openssl as
a dependency package (mharmsen)
- Bugzilla Bug #1390321 - two-step externally-signed CA installation fails due
to missing AuthorityID (ftweedal)
- Bugzilla Bug #1390322 - Spurious host authority entries created (ftweedal)
- Bugzilla Bug #1390324 - KRA installation failed against externally-signed CA
with partial certificate chain (edewata)
- Bugzilla Bug #1389757 - Problems with FIPS mode (edewata)
- Bugzilla Bug #1390311 - Fix packaging duplicates of classes in multiple jar
files (edewata)
- Bugzilla Bug #1390325 - Typo in comment line of UserPwdDirAuthentication.java
(edewata)
- ## RHCS 9.1.z Batch Update 1
- Bugzilla Bug #1248553 - TPS Enrollment always goes to 'ca1' (cfu)
- Bugzilla Bug #1274096 - [BUG] Add ability to disallow TPS to enroll a
single user on multiple tokens. (jmagne)
- Bugzilla Bug #1379379 - Unable to read an encrypted email using renewed
tokens (jmagne)
- Bugzilla Bug #1379749 - Automatic recovery of encryption cert is not working
when a token is physically damaged and a temporary token is issued (jmagne)
- Bugzilla Bug #1381375 - Cert/Key recovery is successful when the cert serial
number and key id on the ldap user mismatches
- Bugzilla Bug #1381635 - Token format with external reg fails when
op.format.externalRegAddToToken.revokeCert=true (cfu)
- Bugzilla Bug #1382762 - PIN_RESET policy is not giving expected results when
set on a token (jmagne)
- Bugzilla Bug #1382862 - TPS token enrollment fails to setupSecureChannel
when TPS and TKS security db is on fips mode. (jmagne)
- Bugzilla Bug #1386257 - Changes to target.agent.approve.list parameter is
not reflected in the TPS Web UI (edewata)
[10.3.3-11]
- PKI TRAC Ticket #1527 - TPS Enrollment always goes to 'ca1' (cfu)
- PKI TRAC Ticket #1664 - [BUG] Add ability to disallow TPS to enroll a single
user on multiple tokens. (jmagne)
- PKI TRAC Ticket #2478 - pkispawn fails as it is not able to find openssl as a
dependency package (mharmsen)
- PKI TRAC Ticket #2483 - Unable to read an encrypted email using renewed
tokens (jmagne)
- PKI TRAC Ticket #2496 - Cert/Key recovery is successful when the cert serial
number and key id on the ldap user mismatches (cfu)
- PKI TRAC Ticket #2505 - Fix packaging duplicates of classes in multiple jar
files (edewata)
Release/Architecture | Filename | sha256 | Superseded By Advisory | Channel Label |
Oracle Linux 7 (x86_64) | pki-core-10.3.3-14.el7_3.src.rpm | 2282c603278c027495341ce0eab9896df172c457c13622803e139ab27be684ee | ELSA-2024-4222 | ol7_x86_64_latest_archive |
pki-core-10.3.3-14.el7_3.src.rpm | 2282c603278c027495341ce0eab9896df172c457c13622803e139ab27be684ee | ELSA-2024-4222 | ol7_x86_64_optional_archive | |
pki-core-10.3.3-14.el7_3.src.rpm | 2282c603278c027495341ce0eab9896df172c457c13622803e139ab27be684ee | ELSA-2024-4222 | ol7_x86_64_u3_patch | |
pki-base-10.3.3-14.el7_3.noarch.rpm | e24f6322e5e6c65aca5b3f2f5a2ffde9aaa77c0fae1fb3dce1b4098978db9e57 | ELSA-2024-4222 | ol7_x86_64_latest_archive | |
pki-base-10.3.3-14.el7_3.noarch.rpm | e24f6322e5e6c65aca5b3f2f5a2ffde9aaa77c0fae1fb3dce1b4098978db9e57 | ELSA-2024-4222 | ol7_x86_64_u3_patch | |
pki-base-java-10.3.3-14.el7_3.noarch.rpm | a3d7e5ddbdce7021248bd70b1920f2f1fd1577d9d217d7ddb00c71e4c165c37f | ELSA-2024-4222 | ol7_x86_64_latest_archive | |
pki-base-java-10.3.3-14.el7_3.noarch.rpm | a3d7e5ddbdce7021248bd70b1920f2f1fd1577d9d217d7ddb00c71e4c165c37f | ELSA-2024-4222 | ol7_x86_64_u3_patch | |
pki-ca-10.3.3-14.el7_3.noarch.rpm | 8a12b52ee1df5e20f2c58d2b96d1cec8392cb3733831fa431c61001c5dbf926c | ELSA-2024-4222 | ol7_x86_64_latest_archive | |
pki-ca-10.3.3-14.el7_3.noarch.rpm | 8a12b52ee1df5e20f2c58d2b96d1cec8392cb3733831fa431c61001c5dbf926c | ELSA-2024-4222 | ol7_x86_64_u3_patch | |
pki-javadoc-10.3.3-14.el7_3.noarch.rpm | 1fbbcc1048e08663493af53df458ae8ca9c837c8e3d3eb75ea27693f823849a0 | ELSA-2024-4222 | ol7_x86_64_optional_archive | |
pki-kra-10.3.3-14.el7_3.noarch.rpm | da2234d63ddfe9bfd74884036e1b7929998aeb15e5df5eac57e4a49bea07d027 | ELSA-2024-4222 | ol7_x86_64_latest_archive | |
pki-kra-10.3.3-14.el7_3.noarch.rpm | da2234d63ddfe9bfd74884036e1b7929998aeb15e5df5eac57e4a49bea07d027 | ELSA-2024-4222 | ol7_x86_64_u3_patch | |
pki-server-10.3.3-14.el7_3.noarch.rpm | 2183acd12c2cfe7233de3c299fda148468941f137068fc13dd316ce759d397b8 | ELSA-2024-4222 | ol7_x86_64_latest_archive | |
pki-server-10.3.3-14.el7_3.noarch.rpm | 2183acd12c2cfe7233de3c299fda148468941f137068fc13dd316ce759d397b8 | ELSA-2024-4222 | ol7_x86_64_u3_patch | |
pki-symkey-10.3.3-14.el7_3.x86_64.rpm | d6779232ad353ecbdace33ba747008de13cb90e1f3605e271c6b82cb8ab8261d | ELSA-2024-4222 | ol7_x86_64_latest_archive | |
pki-symkey-10.3.3-14.el7_3.x86_64.rpm | d6779232ad353ecbdace33ba747008de13cb90e1f3605e271c6b82cb8ab8261d | ELSA-2024-4222 | ol7_x86_64_u3_patch | |
pki-tools-10.3.3-14.el7_3.x86_64.rpm | 02624325a93fa612fb04b7237514d440021c5a51d0226ac5a0852b4cf4773b7b | ELSA-2024-4222 | ol7_x86_64_latest_archive | |
pki-tools-10.3.3-14.el7_3.x86_64.rpm | 02624325a93fa612fb04b7237514d440021c5a51d0226ac5a0852b4cf4773b7b | ELSA-2024-4222 | ol7_x86_64_u3_patch |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team