Name: | pki-javadoc |
Version: | 10.5.18 |
Release: | 32.el7_9 |
Architecture: | noarch |
Group: | Documentation |
Size: | 58509332 |
License: | GPLv2 |
RPM: |
pki-javadoc-10.5.18-32.el7_9.noarch.rpm
|
Source RPM: |
pki-core-10.5.18-32.el7_9.src.rpm
|
Build Date: | Tue Jul 02 2024 |
Build Host: | build-ol7-x86_64.oracle.com |
Vendor: | Oracle America |
URL: | http://pki.fedoraproject.org/ |
Summary: | Certificate System - PKI Framework Javadocs |
Description: | This documentation pertains exclusively to version 10.5.18 of
the PKI Framework and Tools.
This package is a part of the PKI Core used by the Certificate System.
==================================
|| ABOUT "CERTIFICATE SYSTEM" ||
==================================
Certificate System (CS) is an enterprise software system designed
to manage enterprise Public Key Infrastructure (PKI) deployments.
PKI Core contains ALL top-level java-based Tomcat PKI components:
* pki-symkey
* pki-base
* pki-base-python2 (alias for pki-base)
* pki-base-python3
* pki-base-java
* pki-tools
* pki-server
* pki-ca
* pki-kra
* pki-ocsp
* pki-tks
* pki-tps
* pki-javadoc
which comprise the following corresponding PKI subsystems:
* Certificate Authority (CA)
* Key Recovery Authority (KRA)
* Online Certificate Status Protocol (OCSP) Manager
* Token Key Service (TKS)
* Token Processing Service (TPS)
Python clients need only install the pki-base package. This
package contains the python REST client packages and the client
upgrade framework.
Java clients should install the pki-base-java package. This package
contains the legacy and REST Java client packages. These clients
should also consider installing the pki-tools package, which contain
native and Java-based PKI tools and utilities.
Certificate Server instances require the fundamental classes and
modules in pki-base and pki-base-java, as well as the utilities in
pki-tools. The main server classes are in pki-server, with subsystem
specific Java classes and resources in pki-ca, pki-kra, pki-ocsp etc.
Finally, if Certificate System is being deployed as an individual or
set of standalone rather than embedded server(s)/service(s), it is
strongly recommended (though not explicitly required) to include at
least one PKI Theme package:
* dogtag-pki-theme (Dogtag Certificate System deployments)
* dogtag-pki-server-theme
* redhat-pki-server-theme (Red Hat Certificate System deployments)
* redhat-pki-server-theme
* customized pki theme (Customized Certificate System deployments)
* <customized>-pki-server-theme
NOTE: As a convenience for standalone deployments, top-level meta
packages may be provided which bind a particular theme to
these certificate server packages.
%setup -q
/usr/bin/git init
/usr/bin/git config user.name "rpm-build"
/usr/bin/git config user.email "<rpm-build>"
/usr/bin/git add .
/usr/bin/git commit -a\
--author "rpm-build <rpm-build>" -m "pki-core-10.5.18 base"" -q
/usr/bin/cat /builddir/build/SOURCES/pki-core-Fix-RSA-PSS-for-IPA-installer.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-Fix-RSA-PSS-for-IPA-installer.patch --author "rpm-build <rpm-build>"" -q -mpki-core-Fix-RSA-PSS-for-IPA-installer.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-rhel-7-9-rhcs-9-7-beta.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-rhel-7-9-rhcs-9-7-beta.patch --author "rpm-build <rpm-build>"" -q -mpki-core-rhel-7-9-rhcs-9-7-beta.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-rhel-7-9-rhcs-9-7-post-beta.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-rhel-7-9-rhcs-9-7-post-beta.patch --author "rpm-build <rpm-build>"" -q -mpki-core-rhel-7-9-rhcs-9-7-post-beta.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-Fix-RSA-PSS-for-SHA512.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-Fix-RSA-PSS-for-SHA512.patch --author "rpm-build <rpm-build>"" -q -mpki-core-Fix-RSA-PSS-for-SHA512.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-rhel-7-9-rhcs-9-7-post-beta-2.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-rhel-7-9-rhcs-9-7-post-beta-2.patch --author "rpm-build <rpm-build>"" -q -mpki-core-rhel-7-9-rhcs-9-7-post-beta-2.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-Fix-CMCResponse-tool.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-Fix-CMCResponse-tool.patch --author "rpm-build <rpm-build>"" -q -mpki-core-Fix-CMCResponse-tool.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-rhel-7-9-rhcs-9-7-bu-2.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-rhel-7-9-rhcs-9-7-bu-2.patch --author "rpm-build <rpm-build>"" -q -mpki-core-rhel-7-9-rhcs-9-7-bu-2.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-Fix-auditProfileUpgrade.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-Fix-auditProfileUpgrade.patch --author "rpm-build <rpm-build>"" -q -mpki-core-Fix-auditProfileUpgrade.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-Fix-AddProfileCaAuditSigningCert.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-Fix-AddProfileCaAuditSigningCert.patch --author "rpm-build <rpm-build>"" -q -mpki-core-Fix-AddProfileCaAuditSigningCert.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-rhel-7-9-rhcs-9-7-bu-4.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-rhel-7-9-rhcs-9-7-bu-4.patch --author "rpm-build <rpm-build>"" -q -mpki-core-rhel-7-9-rhcs-9-7-bu-4.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-Change-var-TPS-to-tps.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-Change-var-TPS-to-tps.patch --author "rpm-build <rpm-build>"" -q -mpki-core-Change-var-TPS-to-tps.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-rhel-7-9-rhcs-9-7-bu-6.0.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-rhel-7-9-rhcs-9-7-bu-6.0.patch --author "rpm-build <rpm-build>"" -q -mpki-core-rhel-7-9-rhcs-9-7-bu-6.0.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-rhel-7-9-rhcs-9-7-bu-6.1.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-rhel-7-9-rhcs-9-7-bu-6.1.patch --author "rpm-build <rpm-build>"" -q -mpki-core-rhel-7-9-rhcs-9-7-bu-6.1.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-rhel-7-9-rhcs-9-7-bu-7.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-rhel-7-9-rhcs-9-7-bu-7.patch --author "rpm-build <rpm-build>"" -q -mpki-core-rhel-7-9-rhcs-9-7-bu-7.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-rhel-7-9-rhcs-9-7-bu-8.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-rhel-7-9-rhcs-9-7-bu-8.patch --author "rpm-build <rpm-build>"" -q -mpki-core-rhel-7-9-rhcs-9-7-bu-8.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-rhel-7-9-rhcs-9-7-bu-9.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-rhel-7-9-rhcs-9-7-bu-9.patch --author "rpm-build <rpm-build>"" -q -mpki-core-rhel-7-9-rhcs-9-7-bu-9.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-rhel-7-9-rhcs-9-7-bu-10.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-rhel-7-9-rhcs-9-7-bu-10.patch --author "rpm-build <rpm-build>"" -q -mpki-core-rhel-7-9-rhcs-9-7-bu-10.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-rhel-7-9-rhcs-9-7-bu-11.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-rhel-7-9-rhcs-9-7-bu-11.patch --author "rpm-build <rpm-build>"" -q -mpki-core-rhel-7-9-rhcs-9-7-bu-11.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-rhel-7-9-rhcs-9-7-bu-15.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-rhel-7-9-rhcs-9-7-bu-15.patch --author "rpm-build <rpm-build>"" -q -mpki-core-rhel-7-9-rhcs-9-7-bu-15.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-rhel-7-9-rhcs-9-7-bu-18.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-rhel-7-9-rhcs-9-7-bu-18.patch --author "rpm-build <rpm-build>"" -q -mpki-core-rhel-7-9-rhcs-9-7-bu-18.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-rhel-7-9-rhcs-9-7-bu-19.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-rhel-7-9-rhcs-9-7-bu-19.patch --author "rpm-build <rpm-build>"" -q -mpki-core-rhel-7-9-rhcs-9-7-bu-19.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-rhel-7-9-rhcs-9-7-bu-21.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-rhel-7-9-rhcs-9-7-bu-21.patch --author "rpm-build <rpm-build>"" -q -mpki-core-rhel-7-9-rhcs-9-7-bu-21.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-rhel-7-9-rhcs-9-7-bu-23.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-rhel-7-9-rhcs-9-7-bu-23.patch --author "rpm-build <rpm-build>"" -q -mpki-core-rhel-7-9-rhcs-9-7-bu-23.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-rhel-7-9-rhcs-9-7-CY24Q2.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-rhel-7-9-rhcs-9-7-CY24Q2.patch --author "rpm-build <rpm-build>"" -q -mpki-core-rhel-7-9-rhcs-9-7-CY24Q2.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-rhel-7-9-rhcs-9-7-CVE-2023-4727.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-rhel-7-9-rhcs-9-7-CVE-2023-4727.patch --author "rpm-build <rpm-build>"" -q -mpki-core-rhel-7-9-rhcs-9-7-CVE-2023-4727.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-rhel-7-9-rhcs-9-7-CY24Q2.1.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-rhel-7-9-rhcs-9-7-CY24Q2.1.patch --author "rpm-build <rpm-build>"" -q -mpki-core-rhel-7-9-rhcs-9-7-CY24Q2.1.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-rhel-7-9-rhcs-9-7-CY24Q2.2.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-rhel-7-9-rhcs-9-7-CY24Q2.2.patch --author "rpm-build <rpm-build>"" -q -mpki-core-rhel-7-9-rhcs-9-7-CY24Q2.2.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-rhel-7-9-rhcs-9-7-CY24Q2.3.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-rhel-7-9-rhcs-9-7-CY24Q2.3.patch --author "rpm-build <rpm-build>"" -q -mpki-core-rhel-7-9-rhcs-9-7-CY24Q2.3.patch
/usr/bin/cat /builddir/build/SOURCES/pki-core-rhel-7-9-rhcs-9-7-CY24Q2.4.patch |
/usr/bin/git apply --index -
/usr/bin/git commit -q -m pki-core-rhel-7-9-rhcs-9-7-CY24Q2.4.patch --author "rpm-build <rpm-build>"" -q -mpki-core-rhel-7-9-rhcs-9-7-CY24Q2.4.patch |
-
Mon Jun 03 2024 Dogtag Team <devel@lists.dogtagpki.org> 10.5.18-32
- ##########################################################################
- # RHEL 7.9 (Async Security Update CY24Q2.4):
- ##########################################################################
- Updated nspr-devel and nss-devel build requirements as well as nss and
nss-tools runtime requirements (mharmsen)
- Updated jss dependencies (mharmsen)
- Added git build dependency (mharmsen)
- Additional trivial fix (jmagne)
- RHEL-9917 - EMBARGOED CVE-2023-4727 pki-core: dogtag ca:
token authentication bypass vulnerability [rhel-7.9.z] (jmagne)
- RHEL-24339 - pki-core - PrettyPrintCert does not properly
translate AIA information into a readable format [RHEL 7.9.z] (mfargett)
- RHEL-26881 - Fix additional OID mappings [RHEL 7.9.z] (mfargett)
- ##########################################################################
- # RHCS 9.7 (Async Security Update CY24Q2.4):
- ##########################################################################
- Bug 2047831 - Coolkey Hardcoded RSA Max Key Size
[RHCS 9.7.z] (jmagne)
- Bug 2121463 - Add Secure Channel Support for AES-256 Keys
[RHCS 9.7.z] (jmagne)
- Bug 2177785 - TPS missing Host header field in HTTP/1.1 request
message [RHCS 9.7.z] (mfargett)
- Bug 2180920 - add AES support for TMS server-side keygen on latest
HSM / FIPS environment [RHCS 9.7.z] (jmagne)
- Bug 2233158 - Make key wrapping algorithm configurable
between AES-KWP and AES-CBC [RHCS 9.7.z] (jmagne)
- Bug 2253682 - pkidestroy log keeps HSM token password
[RHCS 9.7.z] (mfargett, jmagne)
- Bug 2265180 - Add Support for Symmetric Key Rollover
[RHCS 9.7.z] (jmagne)
- Bug 2280722 - Shared token is not generated for TPS and TKS
during install despite adding pki_import_shared_secret=True param
at install [RHCS 9.7.z] (jmagne)
-
Fri May 31 2024 Dogtag Team <devel@lists.dogtagpki.org> 10.5.18-31
- ##########################################################################
- # RHEL 7.9 (Async Security Update CY24Q2.3):
- ##########################################################################
- Updated nspr-devel and nss-devel build requirements as well as nss and
nss-tools runtime requirements (mharmsen)
- Updated jss dependencies (mharmsen)
- Added git build dependency (mharmsen)
- Additional trivial fix (jmagne)
- RHEL-9917 - EMBARGOED CVE-2023-4727 pki-core: dogtag ca:
token authentication bypass vulnerability [rhel-7.9.z] (jmagne)
- RHEL-24339 - pki-core - PrettyPrintCert does not properly
translate AIA information into a readable format [RHEL 7.9.z] (mfargett)
- RHEL-26881 - Fix additional OID mappings [RHEL 7.9.z] (mfargett)
- ##########################################################################
- # RHCS 9.7 (Async Security Update CY24Q2.3):
- ##########################################################################
- Bug 2047831 - Coolkey Hardcoded RSA Max Key Size
[RHCS 9.7.z] (jmagne)
- Bug 2121463 - Add Secure Channel Support for AES-256 Keys
[RHCS 9.7.z] (jmagne)
- Bug 2177785 - TPS missing Host header field in HTTP/1.1 request
message [RHCS 9.7.z] (mfargett)
- Bug 2180920 - add AES support for TMS server-side keygen on latest
HSM / FIPS environment [RHCS 9.7.z] (jmagne)
- Bug 2233158 - Make key wrapping algorithm configurable
between AES-KWP and AES-CBC [RHCS 9.7.z] (jmagne)
- Bug 2253682 - pkidestroy log keeps HSM token password
[RHCS 9.7.z] (mfargett, jmagne)
- Bug 2265180 - Add Support for Symmetric Key Rollover
[RHCS 9.7.z] (jmagne)
- Bug 2280722 - Shared token is not generated for TPS and TKS
during install despite adding pki_import_shared_secret=True param
at install [RHCS 9.7.z] (jmagne)
-
Thu May 23 2024 Dogtag Team <devel@lists.dogtagpki.org> 10.5.18-30
- ##########################################################################
- # RHEL 7.9 (Async Security Update CY24Q2.2):
- ##########################################################################
- Updated nspr-devel and nss-devel build requirements as well as nss and
nss-tools runtime requirements (mharmsen)
- Updated jss dependencies (mharmsen)
- Added git build dependency (mharmsen)
- Additional trivial fix (jmagne)
- RHEL-9917 - EMBARGOED CVE-2023-4727 pki-core: dogtag ca:
token authentication bypass vulnerability [rhel-7.9.z] (jmagne)
- RHEL-24339 - pki-core - PrettyPrintCert does not properly
translate AIA information into a readable format [RHEL 7.9.z] (mfargett)
- RHEL-26881 - Fix additional OID mappings [RHEL 7.9.z] (mfargett)
- ##########################################################################
- # RHCS 9.7 (Async Security Update CY24Q2.2):
- ##########################################################################
- Bug 2047831 - Coolkey Hardcoded RSA Max Key Size
[RHCS 9.7.z] (jmagne)
- Bug 2121463 - Add Secure Channel Support for AES-256 Keys
[RHCS 9.7.z] (jmagne)
- Bug 2177785 - TPS missing Host header field in HTTP/1.1 request
message [RHCS 9.7.z] (mfargett)
- Bug 2180920 - add AES support for TMS server-side keygen on latest
HSM / FIPS environment [RHCS 9.7.z] (jmagne)
- Bug 2233158 - Make key wrapping algorithm configurable
between AES-KWP and AES-CBC [RHCS 9.7.z] (jmagne)
- Bug 2253682 - pkidestroy log keeps HSM token password
[RHCS 9.7.z] (mfargett, jmagne)
- Bug 2265180 - Add Support for Symmetric Key Rollover
[RHCS 9.7.z] (jmagne)
- Bug 2280722 - Shared token is not generated for TPS and TKS
during install despite adding pki_import_shared_secret=True param
at install [RHCS 9.7.z] (jmagne)
-
Fri May 17 2024 Dogtag Team <devel@lists.dogtagpki.org> 10.5.18-29
- ##########################################################################
- # RHEL 7.9 (Async Security Update CY24Q2.1):
- ##########################################################################
- Updated nspr-devel and nss-devel build requirements as well as nss and
nss-tools runtime requirements (mharmsen)
- Updated jss dependencies (mharmsen)
- Added git build dependency (mharmsen)
- Additional trivial fix (jmagne)
- RHEL-9917 - EMBARGOED CVE-2023-4727 pki-core: dogtag ca:
token authentication bypass vulnerability [rhel-7.9.z] (jmagne)
- RHEL-24339 - pki-core - PrettyPrintCert does not properly
translate AIA information into a readable format [RHEL 7.9.z] (mfargett)
- RHEL-26881 - Fix additional OID mappings [RHEL 7.9.z] (mfargett)
- ##########################################################################
- # RHCS 9.7 (Async Security Update CY24Q2.1):
- ##########################################################################
- Bug 2047831 - Coolkey Hardcoded RSA Max Key Size
[RHCS 9.7.z] (jmagne)
- Bug 2121463 - Add Secure Channel Support for AES-256 Keys
[RHCS 9.7.z] (jmagne)
- Bug 2177785 - TPS missing Host header field in HTTP/1.1 request
message [RHCS 9.7.z] (mfargett)
- Bug 2180920 - add AES support for TMS server-side keygen on latest
HSM / FIPS environment [RHCS 9.7.z] (jmagne)
- Bug 2233158 - Make key wrapping algorithm configurable
between AES-KWP and AES-CBC [RHCS 9.7.z] (jmagne)
- Bug 2253682 - pkidestroy log keeps HSM token password
[RHCS 9.7.z] (mfargett, jmagne)
- Bug 2265180 - Add Support for Symmetric Key Rollover
[RHCS 9.7.z] (jmagne)
- Bug 2280722 - Shared token is not generated for TPS and TKS
during install despite adding pki_import_shared_secret=True param
at install [RHCS 9.7.z] (jmagne)
-
Thu Apr 18 2024 Dogtag Team <devel@lists.dogtagpki.org> 10.5.18-28
- ##########################################################################
- # RHEL 7.9 (Async Security Update CY24Q2):
- ##########################################################################
- Updated nspr-devel and nss-devel build requirements as well as nss and
nss-tools runtime requirements (mharmsen)
- Updated jss dependencies (mharmsen)
- Added git build dependency (mharmsen)
- RHEL-9917 - EMBARGOED CVE-2023-4727 pki-core: dogtag ca:
token authentication bypass vulnerability [rhel-7.9.z] (jmagne)
- RHEL-24339 - pki-core - PrettyPrintCert does not properly
translate AIA information into a readable format [RHEL 7.9.z] (mfargett)
- RHEL-26881 - Fix additional OID mappings [RHEL 7.9.z] (mfargett)
- ##########################################################################
- # RHCS 9.7 (Async Security Update CY24Q2):
- ##########################################################################
- Bug 2047831 - Coolkey Hardcoded RSA Max Key Size
[RHCS 9.7.z] (jmagne)
- Bug 2121463 - Add Secure Channel Support for AES-256 Keys
[RHCS 9.7.z] (jmagne)
- Bug 2177785 - TPS missing Host header field in HTTP/1.1 request
message [RHCS 9.7.z] (mfargett)
- Bug 2180920 - add AES support for TMS server-side keygen on latest
HSM / FIPS environment [RHCS 9.7.z] (jmagne)
- Bug 2233158 - Make key wrapping algorithm configurable
between AES-KWP and AES-CBC [RHCS 9.7.z] (jmagne)
- Bug 2253682 - pkidestroy log keeps HSM token password
[RHCS 9.7.z] (mfargett)
- Bug 2265180 - Add Support for Symmetric Key Rollover
[RHCS 9.7.z] (jmagne)
-
Mon May 01 2023 Dogtag Team <devel@lists.dogtagpki.org> 10.5.18-27
- ##########################################################################
- # RHEL 7.9 (Batch Update 23):
- ##########################################################################
- ##########################################################################
- # RHCS 9.7 (Batch Update 23):
- ##########################################################################
- Bugzilla Bug #2179305 - Unable to use the TPS UI "Token Filter" to filter
a list of tokens [RHCS 9.7] (ckelley)
- Bugzilla Bug #2092522 - TPS Not allowing Token Status Change based on
Revoke True/False and Hold till last True/False [RHCS 9.7.z] (cfu)
- Bugzilla Bug #2176233 - TPS Not allowing Token Status Change based on
Revoke True/False and Hold till last True/False (part 2) [RHCS 9.7.z] (cfu)
-
Fri Mar 24 2023 Dogtag Team <devel@lists.dogtagpki.org> 10.5.18-26
- ##########################################################################
- # RHEL 7.9 (Batch Update 22):
- ##########################################################################
- ##########################################################################
- # RHCS 9.7 (Batch Update 22):
- ##########################################################################
- Bugzilla Bug #2179305 - Unable to use the TPS UI "Token Filter" to filter
a list of tokens [RHCS 9.7] (ckelley)
- Bugzilla Bug #2092522 - TPS Not allowing Token Status Change based on
Revoke True/False and Hold till last True/False [RHCS 9.7.z] (cfu)
- Bugzilla Bug #2176233 - TPS Not allowing Token Status Change based on
Revoke True/False and Hold till last True/False (part 2) [RHCS 9.7.z] (cfu)
-
Fri Feb 10 2023 Dogtag Team <devel@lists.dogtagpki.org> 10.5.18-25
- ##########################################################################
- # RHEL 7.9 (Batch Update 21):
- ##########################################################################
- Bugzilla Bug #2160355 - RA Separation by KeyType - Set Token Status
[RHCS 9.7 bu 21] (cfu, ckelley)
- ##########################################################################
- # RHCS 9.7 (Batch Update 21):
- ##########################################################################
- Bugzilla Bug #1774177 - Rebase redhat-pki, redhat-pki-theme, pki-core, and
pki-console to 10.5.18 in RHCS 9.7 (Batch Update 7)
-
Wed Oct 26 2022 Dogtag Team <devel@lists.dogtagpki.org> 10.5.18-24
- ##########################################################################
- # RHEL 7.9 (Batch Update 19):
- ##########################################################################
- Bugzilla Bug #2107329 - CVE-2022-2414 pki-core: access to external
entities when parsing XML can lead to XXE [rhel-7.9.z] (ckelley, mharmsen)
- ##########################################################################
- # RHCS 9.7 (Batch Update 19):
- ##########################################################################
- Bugzilla Bug #2107325 - CVE-2022-2414 pki-core: access to external
entities when parsing XML can lead to XXE [certificate_system_9.7.z]
(ckelley, mharmsen)
-
Mon Oct 10 2022 Dogtag Team <devel@lists.dogtagpki.org> 10.5.18-23
- ##########################################################################
- # RHEL 7.9 (Batch Update 18):
- ##########################################################################
- Bugzilla Bug #2107329 - CVE-2022-2414 pki-core: access to external
entities when parsing XML can lead to XXE [rhel-7.9.z] (ckelley, mharmsen)
- Bugzilla Bug #2111514 - CVE-2022-2393 pki-core: When using the
caServerKeygen_DirUserCert profile, user can get certificates for other
UIDs by entering name in Subject field [rhel-7.9] (cfu, ckelley)
- ##########################################################################
- # RHCS 9.7 (Batch Update 18):
- ##########################################################################
- Bugzilla Bug #2107325 - CVE-2022-2414 pki-core: access to external
entities when parsing XML can lead to XXE [certificate_system_9.7.z]
(ckelley, mharmsen)
- Bugzilla Bug #2111493 - CVE-2022-2393 pki-core: When using the
caServerKeygen_DirUserCert profile, user can get certificates for other
UIDs by entering name in Subject field [rhcs_9.7] (cfu, ckelley)