java-11-openjdk-11.0.17.0.8-2.el7

エラータID: AXSA:2022-3906:14

Release date: 
Thursday, October 20, 2022 - 08:05
Subject: 
java-11-openjdk-11.0.17.0.8-2.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and
the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

* OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS,
8286077) (CVE-2022-21618)
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security,
8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server,
8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526)
(CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910)
(CVE-2022-21624)
* OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366)
(CVE-2022-39399)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s)
listed in the References section.

Bug Fix(es):

* Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17)
(BZ#2130373)

CVE-2022-21618
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product
of Oracle Java SE (component: JGSS). Supported versions that are affected are
Oracle Java SE: 17.0.4.1, 19; Oracle GraalVM Enterprise Edition: 21.3.3 and
22.2.0. Easily exploitable vulnerability allows unauthenticated attacker with
network access via Kerberos to compromise Oracle Java SE, Oracle GraalVM
Enterprise Edition. Successful attacks of this vulnerability can result in
unauthorized update, insert or delete access to some of Oracle Java SE, Oracle
GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to
Java deployments, typically in clients running sandboxed Java Web Start
applications or sandboxed Java applets, that load and run untrusted code (e.g.,
code that comes from the internet) and rely on the Java sandbox for security.
This vulnerability can also be exploited by using APIs in the specified
Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1
Base Score 5.3 (Integrity impacts). CVSS Vector:
(CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2022-21619
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product
of Oracle Java SE (component: Security). Supported versions that are affected
are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM
Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit
vulnerability allows unauthenticated attacker with network access via multiple
protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition.
Successful attacks of this vulnerability can result in unauthorized update,
insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise
Edition accessible data. Note: This vulnerability applies to Java deployments,
typically in clients running sandboxed Java Web Start applications or sandboxed
Java applets, that load and run untrusted code (e.g., code that comes from the
internet) and rely on the Java sandbox for security. This vulnerability can also
be exploited by using APIs in the specified Component, e.g., through a web
service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity
impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2022-21624
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product
of Oracle Java SE (component: JNDI). Supported versions that are affected are
Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM
Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Difficult to exploit
vulnerability allows unauthenticated attacker with network access via multiple
protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition.
Successful attacks of this vulnerability can result in unauthorized update,
insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise
Edition accessible data. Note: This vulnerability applies to Java deployments,
typically in clients running sandboxed Java Web Start applications or sandboxed
Java applets, that load and run untrusted code (e.g., code that comes from the
internet) and rely on the Java sandbox for security. This vulnerability can also
be exploited by using APIs in the specified Component, e.g., through a web
service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity
impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2022-21626
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product
of Oracle Java SE (component: Security). Supported versions that are affected
are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1; Oracle GraalVM Enterprise
Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable vulnerability allows
unauthenticated attacker with network access via HTTPS to compromise Oracle Java
SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability
can result in unauthorized ability to cause a partial denial of service (partial
DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This
vulnerability applies to Java deployments, typically in clients running
sandboxed Java Web Start applications or sandboxed Java applets, that load and
run untrusted code (e.g., code that comes from the internet) and rely on the
Java sandbox for security. This vulnerability can also be exploited by using
APIs in the specified Component, e.g., through a web service which supplies data
to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector:
(CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2022-21628
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product
of Oracle Java SE (component: Lightweight HTTP Server). Supported versions that
are affected are Oracle Java SE: 8u341, 8u345-perf, 11.0.16.1, 17.0.4.1, 19;
Oracle GraalVM Enterprise Edition: 20.3.7, 21.3.3 and 22.2.0. Easily exploitable
vulnerability allows unauthenticated attacker with network access via HTTP to
compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks
of this vulnerability can result in unauthorized ability to cause a partial
denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise
Edition. Note: This vulnerability applies to Java deployments, typically in
clients running sandboxed Java Web Start applications or sandboxed Java applets,
that load and run untrusted code (e.g., code that comes from the internet) and
rely on the Java sandbox for security. This vulnerability does not apply to Java
deployments, typically in servers, that load and run only trusted code (e.g.,
code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability
impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2022-39399
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product
of Oracle Java SE (component: Networking). Supported versions that are affected
are Oracle Java SE: 11.0.16.1, 17.0.4.1, 19; Oracle GraalVM Enterprise Edition:
20.3.7, 21.3.3 and 22.2.0. Difficult to exploit vulnerability allows
unauthenticated attacker with network access via HTTP to compromise Oracle Java
SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability
can result in unauthorized update, insert or delete access to some of Oracle
Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This
vulnerability applies to Java deployments, typically in clients running
sandboxed Java Web Start applications or sandboxed Java applets, that load and
run untrusted code (e.g., code that comes from the internet) and rely on the
Java sandbox for security. This vulnerability does not apply to Java
deployments, typically in servers, that load and run only trusted code (e.g.,
code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity
impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. java-11-openjdk-11.0.17.0.8-2.el7.src.rpm
    MD5: 529dc4438ef183f8f41ebc01c2102a8b
    SHA-256: 4d41d8f8a6352066b98fb1d014b452554a6cd05b71daf60b39d70b66c2236ff3
    Size: 75.28 MB

Asianux Server 7 for x86_64
  1. java-11-openjdk-11.0.17.0.8-2.el7.x86_64.rpm
    MD5: 36e977882be76ef87986467f72597b6f
    SHA-256: 59ea74e6d481eab14f2ee7186ece89f413d88ea6d8b8a5fa37750973c43e3874
    Size: 236.80 kB
  2. java-11-openjdk-debug-11.0.17.0.8-2.el7.x86_64.rpm
    MD5: 507f7ffb219338d63941deea69a0284c
    SHA-256: cfa3b5ae6f27d93565cf3f5e69ac212e86c4f86c8a0cfb9862198af85c1f57da
    Size: 242.02 kB
  3. java-11-openjdk-demo-11.0.17.0.8-2.el7.x86_64.rpm
    MD5: eb56923a98dc0e81d49e24b7c0d8c2ae
    SHA-256: ccc50968e6449a903ad707172f5623b17b67263a62f22afcb215b7f923c86674
    Size: 4.36 MB
  4. java-11-openjdk-demo-debug-11.0.17.0.8-2.el7.x86_64.rpm
    MD5: 15e7994b3d1030c35eebd7822be1bf67
    SHA-256: 5220d935836bd36db6e786fbb60bc619c89ecd64a60930308c4f3fc8e355b3ad
    Size: 4.36 MB
  5. java-11-openjdk-devel-11.0.17.0.8-2.el7.x86_64.rpm
    MD5: b4a85a55514f40efe1e8f55fc3a01e2b
    SHA-256: ab428e56af2bd0a746371e012d05e6aa26e2bde8596a1b4d78c4daea66726c1e
    Size: 3.38 MB
  6. java-11-openjdk-devel-debug-11.0.17.0.8-2.el7.x86_64.rpm
    MD5: 78887da3272ec8901138d8958983fa1d
    SHA-256: b9e979f940720c48816f6be68df9cee815d63d2eaac42a7c82efba09a2b7ea92
    Size: 3.38 MB
  7. java-11-openjdk-headless-11.0.17.0.8-2.el7.x86_64.rpm
    MD5: 11c1043ecba87ff77c4c705f57e7b3ca
    SHA-256: 992f7da21e4e21e766aa8cd51bf28b454bb5309b867a9a9a5a28c6517320f31f
    Size: 38.91 MB
  8. java-11-openjdk-headless-debug-11.0.17.0.8-2.el7.x86_64.rpm
    MD5: b0cef0220bf2ef0be22533029f4afd89
    SHA-256: affee5fafd22a75b2e67c594d05e3d0fe5f6af747aae06a3e7fc25e12a1fe13b
    Size: 41.44 MB
  9. java-11-openjdk-javadoc-11.0.17.0.8-2.el7.x86_64.rpm
    MD5: 4a96ec396eba8156a6ccffc0d00e36e7
    SHA-256: 1ba11488bb47dd8b2db07f3cfdc23f800df9c77eb4a48ccf71bc9ab7bb927679
    Size: 16.10 MB
  10. java-11-openjdk-javadoc-debug-11.0.17.0.8-2.el7.x86_64.rpm
    MD5: bc0fe76092120f4b9be1b1e2d9071f27
    SHA-256: 95f2b8bc42801e3396d75fbf59913ad5fd9afc5d5cee0422b686f4d16eabb13c
    Size: 16.10 MB
  11. java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el7.x86_64.rpm
    MD5: 5ab2cc9e26fc1830e8cf3aec3640dda2
    SHA-256: aaf433e45094a65d57c31e6f2712f3dcc791bcb1ef4434544aeb28bd4f617646
    Size: 42.08 MB
  12. java-11-openjdk-javadoc-zip-debug-11.0.17.0.8-2.el7.x86_64.rpm
    MD5: d6a6f7bd3e27b475beaec45d8f9274b1
    SHA-256: 949bf450db95783a978b9b3400542c6cea3065a769a3293c1f67b34b1a47f483
    Size: 42.08 MB
  13. java-11-openjdk-jmods-11.0.17.0.8-2.el7.x86_64.rpm
    MD5: 3f41dedcde50b0a236f1409e0148b5d9
    SHA-256: b0b85a345c371bcb742d9246e51a9444e0d1bf89a2a8f7b1b3f1fee8dc373b42
    Size: 305.56 MB
  14. java-11-openjdk-jmods-debug-11.0.17.0.8-2.el7.x86_64.rpm
    MD5: f9011d2ec380bcb7649d0c0458c53562
    SHA-256: a6dcb27f83abc162b8ba528906a831cb152b7d072b027457ccfefdb42864a7fb
    Size: 174.01 MB
  15. java-11-openjdk-src-11.0.17.0.8-2.el7.x86_64.rpm
    MD5: 55588d6e23d7c1c5ed24fc52d830ac84
    SHA-256: 262484e1d97674dda95583375d01b6adb413a620e52b8cc88321ac1fc4928dfb
    Size: 50.41 MB
  16. java-11-openjdk-src-debug-11.0.17.0.8-2.el7.x86_64.rpm
    MD5: b2aa470f4df91643b6699d465baa9e0f
    SHA-256: f9b54a887a7fd1f0beb71882f2c453509ae366ad7f72427e6b95f7a8bbba4662
    Size: 50.41 MB
  17. java-11-openjdk-11.0.17.0.8-2.el7.i686.rpm
    MD5: f9239c89785ddc734f447388b59e5e1a
    SHA-256: 65b8cfecef40f96f96dce07cc4f4156c14332a01cca294530f5749b2ae4ffc69
    Size: 232.83 kB
  18. java-11-openjdk-debug-11.0.17.0.8-2.el7.i686.rpm
    MD5: c3231ed46291e759fe1a761fd2395560
    SHA-256: 0ff5215f6ffb4d4f9bc988e120d40e984469672e641eb2a6128e55a15ef36214
    Size: 236.21 kB
  19. java-11-openjdk-demo-11.0.17.0.8-2.el7.i686.rpm
    MD5: 5148b5dcc8d6e13c77c566b0ea7c392d
    SHA-256: 7d94da5319f046d657e18a7e873e5ef39fa1ee17c1e488ce4e66ad4b9a228391
    Size: 4.36 MB
  20. java-11-openjdk-demo-debug-11.0.17.0.8-2.el7.i686.rpm
    MD5: 20685e7ab260e87e54fc08648f1cae82
    SHA-256: a02564df87a738b36463ae9f076ea9b3766f859e613f54f7991768480c171d91
    Size: 4.36 MB
  21. java-11-openjdk-devel-11.0.17.0.8-2.el7.i686.rpm
    MD5: 9f315cc1d2355acb1d174d6c21b86f35
    SHA-256: 15abb100c2cf2a031ef7292755ea96ea8ed1aa941cc67e582b14c7868b5d37f3
    Size: 3.36 MB
  22. java-11-openjdk-devel-debug-11.0.17.0.8-2.el7.i686.rpm
    MD5: 0bddd9750dcfff944dc6dd153cf9e8e7
    SHA-256: f2c7d65d0143c4a3b0d6fff7afcd6c0c8b964e6b85439c7dde3cfae78fb4cf53
    Size: 3.36 MB
  23. java-11-openjdk-headless-11.0.17.0.8-2.el7.i686.rpm
    MD5: 3faf8874ff2223758396922d8e64def4
    SHA-256: b5a5106a29fe3ab5de20f9587a1bc8aecf1ab5a3f1c7a468629effaadce39e97
    Size: 35.02 MB
  24. java-11-openjdk-headless-debug-11.0.17.0.8-2.el7.i686.rpm
    MD5: f3d257f81eb74a73471315426b8a7357
    SHA-256: 4752e253f2a46e30ba3b416f9d9f7835f46816d5abbf270f4e5ab1b1461fb7d0
    Size: 36.92 MB
  25. java-11-openjdk-javadoc-11.0.17.0.8-2.el7.i686.rpm
    MD5: 0eecc6f5a8d5b5b59d8cb08593ffd613
    SHA-256: e1dc2bb5a46ab820036e03f79a72066975e01889ac79d13a847993ac270c56f4
    Size: 16.09 MB
  26. java-11-openjdk-javadoc-debug-11.0.17.0.8-2.el7.i686.rpm
    MD5: c14b639887ceb5201adfc72c1ec8245f
    SHA-256: 28fbd4cb0625f487d30580dbbc39e9bcdb7a73ab18e8fdec1f0fb9427fb19497
    Size: 16.10 MB
  27. java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el7.i686.rpm
    MD5: b7c8e4e803310ae4e902a102625055bf
    SHA-256: 5a80ef8cbf833f4ee74f76f7ca656da0e33d955246868fcfef299fe56d2fb110
    Size: 42.11 MB
  28. java-11-openjdk-javadoc-zip-debug-11.0.17.0.8-2.el7.i686.rpm
    MD5: 26d800da86f22c236daeea44d1840b48
    SHA-256: dce96fa3ccff62ab37e7fe93e9ab36f741cfaea601dd3ca082a95f272e09c7ee
    Size: 42.12 MB
  29. java-11-openjdk-jmods-11.0.17.0.8-2.el7.i686.rpm
    MD5: 59cc9576393f1a2dd243a7e983fa67b4
    SHA-256: dfcbf5c6c548d3ea954bc98d6090a9955ea14931e2a5936b5b2e4349a90b5dd5
    Size: 257.69 MB
  30. java-11-openjdk-jmods-debug-11.0.17.0.8-2.el7.i686.rpm
    MD5: 83a8b68ebb8f088468b41c5a0808d256
    SHA-256: 9a220175ab51e8a012ada051e2f871513254f99e9abbf49e1dff92c9f8883e5a
    Size: 146.94 MB
  31. java-11-openjdk-src-11.0.17.0.8-2.el7.i686.rpm
    MD5: ebb55d06d2e3b8d47e2df9aa3f5f4f45
    SHA-256: 3e68af46cd48cae99bddb83db6db207c84d047513cc35f6766a9effc8020c26d
    Size: 45.67 MB
  32. java-11-openjdk-src-debug-11.0.17.0.8-2.el7.i686.rpm
    MD5: 72ad3010e687e9f2ea5d05e42b46da7d
    SHA-256: f9a46774f5f63dce14180a6d99cd6ee73e43e0d1121212eec009073900776a48
    Size: 45.67 MB