java-11-openjdk-11.0.17.0.8-2.el8
エラータID: AXSA:2022-3902:13
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and
the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS,
8286077) (CVE-2022-21618)
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security,
8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server,
8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526)
(CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910)
(CVE-2022-21624)
* OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366)
(CVE-2022-39399)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.
Bug Fix(es):
* Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17)
[rhel-8] (BZ#2131863)
CVE-2022-21618
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product
of Oracle Java SE (component: JGSS). Supported versions that are affected are
Oracle Java SE: 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 21.3.3 and
22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with
network access via Kerberos to compromise Oracle Java SE, Oracle GraalVM
Enterprise Edition. Successful attacks of this vulnerability can result in
unauthorized update, insert or delete access to some of Oracle Java SE, Oracle
GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to
Java deployments, typically in clients running sandboxed Java Web Start
applications or sandboxed Java applets, that load and run untrusted code (e.g.,
code that comes from the internet) and rely on the Java sandbox for security.
This vulnerability can also be exploited by using APIs in the specified
Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1
Base Score 5.3 (Integrity impacts). CVSS Vector:
(CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2022-21619
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product
of Oracle Java SE (component: Security). Supported versions that are affected
are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM
Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit
vulnerability allows unauthenticated attacker with network access via multiple
protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition.
Successful attacks of this vulnerability can result in unauthorized update,
insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise
Edition accessible data. Note: This vulnerability applies to Java deployments,
typically in clients running sandboxed Java Web Start applications or sandboxed
Java applets, that load and run untrusted code (e.g., code that comes from the
internet) and rely on the Java sandbox for security. This vulnerability can also
be exploited by using APIs in the specified Component, e.g., through a web
service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity
impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2022-21624
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product
of Oracle Java SE (component: JNDI). Supported versions that are affected are
Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM
Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit
vulnerability allows unauthenticated attacker with network access via multiple
protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition.
Successful attacks of this vulnerability can result in unauthorized update,
insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise
Edition accessible data. Note: This vulnerability applies to Java deployments,
typically in clients running sandboxed Java Web Start applications or sandboxed
Java applets, that load and run untrusted code (e.g., code that comes from the
internet) and rely on the Java sandbox for security. This vulnerability can also
be exploited by using APIs in the specified Component, e.g., through a web
service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity
impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2022-21626
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product
of Oracle Java SE (component: Security). Supported versions that are affected
are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1; Oracle GraalVM Enterprise
Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows
unauthenticated attacker with network access via HTTPS to compromise Oracle Java
SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability
can result in unauthorized ability to cause a partial denial of service (partial
DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This
vulnerability applies to Java deployments, typically in clients running
sandboxed Java Web Start applications or sandboxed Java applets, that load and
run untrusted code (e.g., code that comes from the internet) and rely on the
Java sandbox for security. This vulnerability can also be exploited by using
APIs in the specified Component, e.g., through a web service which supplies data
to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector:
(CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2022-21628
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product
of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that
are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19;
Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable
vulnerability allows unauthenticated attacker with network access via HTTP to
compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks
of this vulnerability can result in unauthorized ability to cause a partial
denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise
Edition. Note: This vulnerability applies to Java deployments, typically in
clients running sandboxed Java Web Start applications or sandboxed Java applets,
that load and run untrusted code (e.g., code that comes from the internet) and
rely on the Java sandbox for security. This vulnerability does not apply to Java
deployments, typically in servers, that load and run only trusted code (e.g.,
code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability
impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2022-39399
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product
of Oracle Java SE (component: Networking). Supported versions that are affected
are Oracle Java SE: 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition:
20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows
unauthenticated attacker with network access via HTTP to compromise Oracle Java
SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability
can result in unauthorized update, insert or delete access to some of Oracle
Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This
vulnerability applies to Java deployments, typically in clients running
sandboxed Java Web Start applications or sandboxed Java applets, that load and
run untrusted code (e.g., code that comes from the internet) and rely on the
Java sandbox for security. This vulnerability does not apply to Java
deployments, typically in servers, that load and run only trusted code (e.g.,
code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity
impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Update packages.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JGSS). Supported versions that are affected are Oracle Java SE: 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
N/A
SRPMS
- java-11-openjdk-11.0.17.0.8-2.el8.src.rpm
MD5: 74a558d4fb3b2c4c7edd504badedc605
SHA-256: c481944790890b8ce5ae4ae0a5163b556addfe435bd33aa12d925c9f7ded5b5e
Size: 75.32 MB
Asianux Server 8 for x86_64
- java-11-openjdk-11.0.17.0.8-2.el8.x86_64.rpm
MD5: be1f5505fedc3de418e65e3857ac7b61
SHA-256: 24689c2ed6d6e24c635f68d1c6900849e590cca17a0be8be264f80283ef74c55
Size: 272.46 kB - java-11-openjdk-demo-11.0.17.0.8-2.el8.x86_64.rpm
MD5: 35b1e54bd138c93b349fb84113a93de5
SHA-256: 4ec6bcec3a2a378810f41cdd474a664670fad0942660257027d3b2d2b93eef44
Size: 4.38 MB - java-11-openjdk-demo-fastdebug-11.0.17.0.8-2.el8.x86_64.rpm
MD5: 6d04b24a70dee36a89bd3be7c60e757e
SHA-256: 463c4ce6b24d54cc32e123f80ae40b202c93af2caa47f306bccbcced755fd12d
Size: 4.38 MB - java-11-openjdk-demo-slowdebug-11.0.17.0.8-2.el8.x86_64.rpm
MD5: 952e845e0cb269a57ca8f56f8453d724
SHA-256: d90003385ab00cde5674614c88552ebdbce2106087bffb53baa1823882dd9060
Size: 4.38 MB - java-11-openjdk-devel-11.0.17.0.8-2.el8.x86_64.rpm
MD5: 7e7501b5098ca82f417e289f304842c7
SHA-256: 48b20e5aec452515748f1b5b75c591d3f945b92d0c8344ef28d65e10a6c2c942
Size: 3.39 MB - java-11-openjdk-devel-fastdebug-11.0.17.0.8-2.el8.x86_64.rpm
MD5: bd0f7927fb2308334e1a550d12e6f3ab
SHA-256: e8ed527fd651b48398cccd4fda84da0ea8ec3e4a19bdd669869d5f6d43305391
Size: 3.39 MB - java-11-openjdk-devel-slowdebug-11.0.17.0.8-2.el8.x86_64.rpm
MD5: 4b298b1ac1506f80411196e692165dd8
SHA-256: 82fa99e6fecfc3243afb0f932f4fc5d0be641f9e399eb8a400755a2b051c0d6b
Size: 3.39 MB - java-11-openjdk-fastdebug-11.0.17.0.8-2.el8.x86_64.rpm
MD5: 7ff7c832c549dfbcd09df8d9b9842cbc
SHA-256: cc3bb6fd3e9eb926d64a02015e04e41d72febaba74570e46c568b35cbbb03d0c
Size: 285.96 kB - java-11-openjdk-headless-11.0.17.0.8-2.el8.x86_64.rpm
MD5: d9888716efea091bdfcb99b42bf4f4a8
SHA-256: 13458211de6339dfdcb562744a63fa31ce04cf375b9cb13586a17fc3647eb556
Size: 39.68 MB - java-11-openjdk-headless-fastdebug-11.0.17.0.8-2.el8.x86_64.rpm
MD5: cac5ef017d73e618d3e9bf8953629d6e
SHA-256: b3f2882c440ad299f5b577a15c00ee8a1461648876347efb6c5164f1ea839396
Size: 44.66 MB - java-11-openjdk-headless-slowdebug-11.0.17.0.8-2.el8.x86_64.rpm
MD5: 57b0607e392ba8720326b43ce3227f45
SHA-256: 557c10704e61ed5c08df3059d851d4fd8974ea0fecaeba6e8ac51133a5210449
Size: 43.08 MB - java-11-openjdk-javadoc-11.0.17.0.8-2.el8.x86_64.rpm
MD5: 86e3c36cffe40b6dbb3cabe80c433c99
SHA-256: 11fa9ee7a61062f107f05254528582d3da3c688d600be44ed503e4e4c7907ae3
Size: 15.99 MB - java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el8.x86_64.rpm
MD5: 96d4a7f22026e6d1c361588fe4c9da33
SHA-256: d34f1183fd3f6bd1c976642a81dbd376362343494c5d23433ad627de7e1b1e81
Size: 42.13 MB - java-11-openjdk-jmods-11.0.17.0.8-2.el8.x86_64.rpm
MD5: facf14d0351c6b34d2e3522640715075
SHA-256: 806cf6d1db2669f2881fe588a812ef4f206c804ae69e37424130eefbd809ef2b
Size: 319.11 MB - java-11-openjdk-jmods-fastdebug-11.0.17.0.8-2.el8.x86_64.rpm
MD5: 23a9b01fbf4f2ad68f29206b1ad6cc05
SHA-256: 7ce8a7d05882eafda912cdf312f8aff6e5a2bb94ed8023801ae47d86c977b635
Size: 274.14 MB - java-11-openjdk-jmods-slowdebug-11.0.17.0.8-2.el8.x86_64.rpm
MD5: 6040e6ef3a615578dd0e28d8f863aea5
SHA-256: a4b5a229887f0ebda84dca3ca0030aff12ef1db8399b7fce36221bc9209fbf65
Size: 210.68 MB - java-11-openjdk-slowdebug-11.0.17.0.8-2.el8.x86_64.rpm
MD5: d46396e816df52451ea57fbca79137d4
SHA-256: 692dec5cb13dca6c8a85317ef8df52573d51daa3e31d4a27db16417adbde5767
Size: 275.70 kB - java-11-openjdk-src-11.0.17.0.8-2.el8.x86_64.rpm
MD5: ff109b4388a23bd30d333a92daf23acc
SHA-256: fe6813894efbe3493a015fde4caa7125eb251c99b3bdf2f8bc02fb48e5a17c4b
Size: 50.44 MB - java-11-openjdk-src-fastdebug-11.0.17.0.8-2.el8.x86_64.rpm
MD5: 8ec05d15a524b95a5d60f9a2beb5f3f6
SHA-256: f7a047541003f811264a5acc9d9cab8ca4c6a7526a8757ff5c6919c839fae8ad
Size: 50.44 MB - java-11-openjdk-src-slowdebug-11.0.17.0.8-2.el8.x86_64.rpm
MD5: d01ac17bdd07f6093038a4645183e197
SHA-256: 7b59599b1c3015ef640390f4126357cefba28804015e5c16e6335b65a3775db0
Size: 50.43 MB - java-11-openjdk-static-libs-11.0.17.0.8-2.el8.x86_64.rpm
MD5: 59506659d1973398d87e4bf8564df5a6
SHA-256: 0689b70b29cddea458793f3216e33070edce28459cf9193f93d0093b8673de80
Size: 27.47 MB - java-11-openjdk-static-libs-fastdebug-11.0.17.0.8-2.el8.x86_64.rpm
MD5: ad7f4ae1d7b148f146ac5304350ddb6f
SHA-256: 3ec2f3a92e604f15352eb37b07e424bd7bab208616d255802debe9e53d187619
Size: 27.75 MB - java-11-openjdk-static-libs-slowdebug-11.0.17.0.8-2.el8.x86_64.rpm
MD5: 212dc9aa138b6b72164cda940f1b0da1
SHA-256: 9fb61e2e54c83770e967b010df9e698f9a20b71ee43457c242feedf41c98c53e
Size: 24.23 MB