java-17-openjdk-17.0.3.0.7-1.el9

エラータID: AXSA:2022-3989:07

Release date: 
Wednesday, November 2, 2022 - 09:06
Subject: 
java-17-openjdk-17.0.3.0.7-1.el9
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.

Security Fix(es):

* OpenJDK: Improper ECDSA signature verification (Libraries, 8277233) (CVE-2022-21449)
* OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) (CVE-2022-21476)
* OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) (CVE-2022-21426)
* OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) (CVE-2022-21434)
* OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) (CVE-2022-21443)
* OpenJDK: URI parsing inconsistencies (JNDI, 8278972) (CVE-2022-21496)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2022-21426
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2022-21434
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2022-21443
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2022-21449
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 17.0.2 and 18; Oracle GraalVM Enterprise Edition: 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).
CVE-2022-21476
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
CVE-2022-21496
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JNDI). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. java-17-openjdk-17.0.3.0.7-1.el9.src.rpm
    MD5: 7cb833e37446f8e618981d3e13406f98
    SHA-256: 07f9a8cb8975db98580cd320c4207ab0078a0bc6190c3e4bf6c5adae42e3d813
    Size: 61.17 MB

Asianux Server 9 for x86_64
  1. java-17-openjdk-17.0.3.0.7-1.el9.x86_64.rpm
    MD5: 566b51dcfab090489b2d95357bf8b33f
    SHA-256: c8c8daf79d11d32205593123e3e50ce36072999d3f6914216438f9e60498ac59
    Size: 234.28 kB
  2. java-17-openjdk-demo-17.0.3.0.7-1.el9.x86_64.rpm
    MD5: 30958eb2ec7e01196a734c511442c904
    SHA-256: 5b0c1db9d03ea4c91cd9a64a13661991d4513e9c32b6546916238c8977373395
    Size: 3.37 MB
  3. java-17-openjdk-demo-fastdebug-17.0.3.0.7-1.el9.x86_64.rpm
    MD5: bb36c0cb4dd28e23f0df84c06c43f819
    SHA-256: e9a3c230e765accac897d6275b75eedba7760616fd8002a1c3159fda844d2453
    Size: 3.37 MB
  4. java-17-openjdk-demo-slowdebug-17.0.3.0.7-1.el9.x86_64.rpm
    MD5: 183e9da8896ea814abf08d9bc2c2e2e5
    SHA-256: 6776c5cbc1885b33530bfed74cdd896ca9d939609fcfef6b2dfe0eff479de3f3
    Size: 3.37 MB
  5. java-17-openjdk-devel-17.0.3.0.7-1.el9.x86_64.rpm
    MD5: 0684c250f987af41fb4bccb4c6c433a4
    SHA-256: 80cb8acf19e43b5eb84a64850535d87369dcef9b8fb49648c37194a0b9603873
    Size: 4.71 MB
  6. java-17-openjdk-devel-fastdebug-17.0.3.0.7-1.el9.x86_64.rpm
    MD5: 383afe241804b159f0938716b55f7c17
    SHA-256: aa08467f2f112bfd31e650e92ab4128b1689775f115bd54b2903a780e80b21e7
    Size: 4.71 MB
  7. java-17-openjdk-devel-slowdebug-17.0.3.0.7-1.el9.x86_64.rpm
    MD5: fe908bf85032622b4feefc0ffd865c03
    SHA-256: dbaf3f8fc71f1739d4738470495913eefcf9daed8dde99bc73066e614be559b2
    Size: 4.72 MB
  8. java-17-openjdk-fastdebug-17.0.3.0.7-1.el9.x86_64.rpm
    MD5: 80e7951c670c2892d319d2d9063f934f
    SHA-256: 3b54056c0458efd1649620bfdd45a320d05d96543562a5d9afb7619bac080e41
    Size: 242.98 kB
  9. java-17-openjdk-headless-17.0.3.0.7-1.el9.x86_64.rpm
    MD5: 3a5871914836cc6d404fcbd6c930ce95
    SHA-256: 24646b8438ef5e3c77d86e3340ee96b8473dd19599c0b59806510b2d0f3d8f93
    Size: 39.82 MB
  10. java-17-openjdk-headless-fastdebug-17.0.3.0.7-1.el9.x86_64.rpm
    MD5: b5534d12d2cf35ff8bb97f383a88ec3e
    SHA-256: 07b22c7823f9ee0d5b4ed89087b0226ca3a08985c79193ca7ad129b4b6846357
    Size: 44.88 MB
  11. java-17-openjdk-headless-slowdebug-17.0.3.0.7-1.el9.x86_64.rpm
    MD5: d764ec80ec9de4d2244a6e3d2d542d7f
    SHA-256: e3f99db118e2d1af07e98111712403d36054df26a159e866ee937f93cb4e72de
    Size: 42.38 MB
  12. java-17-openjdk-javadoc-17.0.3.0.7-1.el9.x86_64.rpm
    MD5: 9487992f7d377c242e29ca648e146e01
    SHA-256: cb6e8c4f4a20ca9297ac223ac348c83290f033e47ec6c654bc26f19b670c9703
    Size: 12.48 MB
  13. java-17-openjdk-javadoc-zip-17.0.3.0.7-1.el9.x86_64.rpm
    MD5: e5bbdfcfa4e18a00f14d044e0d5e8565
    SHA-256: 6386fe50c873c0b0666a779f47880107c6421a58dbf434119046a297a26021c8
    Size: 39.40 MB
  14. java-17-openjdk-jmods-17.0.3.0.7-1.el9.x86_64.rpm
    MD5: ba047f9d7e9e824aaab7fbf8a998d540
    SHA-256: e8fc9b7015c44f1ba90c7fc99cc269f38bc9a262b0b078c6edbe3dbda9677f73
    Size: 227.74 MB
  15. java-17-openjdk-jmods-fastdebug-17.0.3.0.7-1.el9.x86_64.rpm
    MD5: e12b29b3689ed64f3cd00b0e61fc2640
    SHA-256: 52a0fa75cb68b936ec6e2e0828fa7c6c977a45ec9cf10ef120db72c296344349
    Size: 227.58 MB