ELSA-2021-0966

ELSA-2021-0966 - pki-core:10.6 security update

Type:SECURITY
Severity:IMPORTANT
Release Date:2021-03-24

Description


pki-core
[10.9.4-3.0.1]
- Remove redhat reference.

[10.9.4-3]
- Bug # 1933146 - PKI instance creation failed with new 389-ds-base build

[10.9.4-2]
- CVE-2021-20179: Fix unprivileged users can renew any certificate


Related CVEs


CVE-2021-20179

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 8 (aarch64) jss-4.7.3-1.module+el8.3.0+7857+983338ee.src.rpm114e519dab0f19677ac40487cdb10d9b-
ldapjdk-4.22.0-1.module+el8.3.0+7857+983338ee.src.rpm84f1f0f77f512865b6b1faf620f5954d-
pki-core-10.9.4-3.0.1.module+el8.3.0+el8+9692+a35cea4e.src.rpm10748bc5f1e3dc3f3256c38b96deed0c-
tomcatjss-7.5.0-1.module+el8.3.0+7857+983338ee.src.rpme5dc8f73aea946a9fa839e60d2b62bd2-
jss-4.7.3-1.module+el8.3.0+7857+983338ee.aarch64.rpm1988ffa2d3090a522fb9733930102439-
jss-javadoc-4.7.3-1.module+el8.3.0+7857+983338ee.aarch64.rpm098c14c74d4b362f96a616916da8acf4-
ldapjdk-4.22.0-1.module+el8.3.0+7857+983338ee.noarch.rpm084be9e3fffd45483478a765edc4087a-
ldapjdk-javadoc-4.22.0-1.module+el8.3.0+7857+983338ee.noarch.rpm7d7559cdb7483e784d1d0fa5e8fafd66-
pki-base-10.9.4-3.0.1.module+el8.3.0+el8+9692+a35cea4e.noarch.rpmd273c108726089ba2abd93c4e1f186f4-
pki-base-java-10.9.4-3.0.1.module+el8.3.0+el8+9692+a35cea4e.noarch.rpm440c229c4477e30d7fc85fec79ca960b-
pki-ca-10.9.4-3.0.1.module+el8.3.0+el8+9692+a35cea4e.noarch.rpmb455ac9225f64cac73b161ad3900a5c9-
pki-kra-10.9.4-3.0.1.module+el8.3.0+el8+9692+a35cea4e.noarch.rpmf85899c1e42e16cebc323760333a88b6-
pki-server-10.9.4-3.0.1.module+el8.3.0+el8+9692+a35cea4e.noarch.rpm67d29d3b19df5bdfa239d59fd9f9e54b-
pki-symkey-10.9.4-3.0.1.module+el8.3.0+el8+9692+a35cea4e.aarch64.rpm60a32f6f97d8b3f51488544b63a7acc0-
pki-tools-10.9.4-3.0.1.module+el8.3.0+el8+9692+a35cea4e.aarch64.rpm0e03f4657c369f3b4b2ba163ef1c7bc0-
python3-pki-10.9.4-3.0.1.module+el8.3.0+el8+9692+a35cea4e.noarch.rpm4565d7c02539c74cf5eb961d5849cb48-
tomcatjss-7.5.0-1.module+el8.3.0+7857+983338ee.noarch.rpm33b10a897cfded6f3744be1e9d5962cd-
Oracle Linux 8 (x86_64) jss-4.7.3-1.module+el8.3.0+7857+983338ee.src.rpm114e519dab0f19677ac40487cdb10d9b-
ldapjdk-4.22.0-1.module+el8.3.0+7857+983338ee.src.rpm84f1f0f77f512865b6b1faf620f5954d-
pki-core-10.9.4-3.0.1.module+el8.3.0+el8+9692+a35cea4e.src.rpm10748bc5f1e3dc3f3256c38b96deed0c-
tomcatjss-7.5.0-1.module+el8.3.0+7857+983338ee.src.rpme5dc8f73aea946a9fa839e60d2b62bd2-
jss-4.7.3-1.module+el8.3.0+7857+983338ee.x86_64.rpm333dbbfa591e8c81061ff28ba358abc4-
jss-javadoc-4.7.3-1.module+el8.3.0+7857+983338ee.x86_64.rpm6dc9386ab3b962e65187404c974145d7-
ldapjdk-4.22.0-1.module+el8.3.0+7857+983338ee.noarch.rpm084be9e3fffd45483478a765edc4087a-
ldapjdk-javadoc-4.22.0-1.module+el8.3.0+7857+983338ee.noarch.rpm7d7559cdb7483e784d1d0fa5e8fafd66-
pki-base-10.9.4-3.0.1.module+el8.3.0+el8+9692+a35cea4e.noarch.rpmd273c108726089ba2abd93c4e1f186f4-
pki-base-java-10.9.4-3.0.1.module+el8.3.0+el8+9692+a35cea4e.noarch.rpm440c229c4477e30d7fc85fec79ca960b-
pki-ca-10.9.4-3.0.1.module+el8.3.0+el8+9692+a35cea4e.noarch.rpmb455ac9225f64cac73b161ad3900a5c9-
pki-kra-10.9.4-3.0.1.module+el8.3.0+el8+9692+a35cea4e.noarch.rpmf85899c1e42e16cebc323760333a88b6-
pki-server-10.9.4-3.0.1.module+el8.3.0+el8+9692+a35cea4e.noarch.rpm67d29d3b19df5bdfa239d59fd9f9e54b-
pki-symkey-10.9.4-3.0.1.module+el8.3.0+el8+9692+a35cea4e.x86_64.rpmd8386b7e64c4db07f5cf06a83cc35b04-
pki-tools-10.9.4-3.0.1.module+el8.3.0+el8+9692+a35cea4e.x86_64.rpmfce4d54064d9c8aad2d355cc485b49d4-
python3-pki-10.9.4-3.0.1.module+el8.3.0+el8+9692+a35cea4e.noarch.rpm4565d7c02539c74cf5eb961d5849cb48-
tomcatjss-7.5.0-1.module+el8.3.0+7857+983338ee.noarch.rpm33b10a897cfded6f3744be1e9d5962cd-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete