java-11-openjdk-11.0.16.0.8-1.el9
エラータID: AXSA:2022-4017:16
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
The following packages have been upgraded to a later upstream version: java-11-openjdk (11.0.16.0.8). (BZ#2084777)
Security Fix(es):
* OpenJDK: integer truncation issue in Xalan-J (JAXP, 8285407) (CVE-2022-34169)
* OpenJDK: class compilation issue (Hotspot, 8281859) (CVE-2022-21540)
* OpenJDK: improper restriction of MethodHandle.invokeBasic() (Hotspot, 8281866) (CVE-2022-21541)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* rh1991003 patch breaks sun.security.pkcs11.wrapper.PKCS11.getInstance() [rhel-9, openjdk-11] (BZ#2099915)
* SecretKey generate/import operations don't add the CKA_SIGN attribute in FIPS mode [rhel-9, openjdk-11] (BZ#2107866)
* Revert to disabling system security properties and FIPS mode support together [rhel-9, openjdk-11] (BZ#2107868)
CVE-2022-21540
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
CVE-2022-21541
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
CVE-2022-34169
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. The Apache Xalan Java project is dormant and in the process of being retired. No future releases of Apache Xalan Java to address this issue are expected. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.
Update packages.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 7u343, 8u333, 11.0.15.1, 17.0.3.1, 18.0.1.1; Oracle GraalVM Enterprise Edition: 20.3.6, 21.3.2 and 22.1.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. The Apache Xalan Java project is dormant and in the process of being retired. No future releases of Apache Xalan Java to address this issue are expected. Note: Java runtimes (such as OpenJDK) include repackaged copies of Xalan.
N/A
SRPMS
- java-11-openjdk-11.0.16.0.8-1.el9.src.rpm
MD5: e37743a2b159607f46b37f591fcf3cb6
SHA-256: 216629c95040089e516b89f4aece1aaf8a88d878d3c941f8f3811ddba0096b77
Size: 75.13 MB
Asianux Server 9 for x86_64
- java-11-openjdk-11.0.16.0.8-1.el9.x86_64.rpm
MD5: 46cdfd8fcbf1c364ea7b110eee93afe9
SHA-256: 2ab0217da95972e27676bcdfd8955fb81ae4f0bcd1f5c285c6136453243bda20
Size: 245.31 kB - java-11-openjdk-demo-11.0.16.0.8-1.el9.x86_64.rpm
MD5: 9d3b9b3ea3882d841bfe78189bd3d804
SHA-256: f3b278510edc0e38611a28f861febb9b7cdcd2b462d3b3b7237d6609b488dc09
Size: 4.31 MB - java-11-openjdk-demo-fastdebug-11.0.16.0.8-1.el9.x86_64.rpm
MD5: 189257a4ed9c0c261a32e2e70fcff668
SHA-256: 50c7b76f8709d8db2adac4da45d56a7f6dc7551eb2c7f59d71ffa431ae565c86
Size: 4.31 MB - java-11-openjdk-demo-slowdebug-11.0.16.0.8-1.el9.x86_64.rpm
MD5: fdef4832ddb12ddada22f000bab0bb12
SHA-256: 3a4f11c1936bc33d18438050ae15c6d20f83dbc26f99e36d255803e637a4e154
Size: 4.31 MB - java-11-openjdk-devel-11.0.16.0.8-1.el9.x86_64.rpm
MD5: baca4807af55f294724ffe10ab00ab83
SHA-256: 63c1b3eb815392315ab0b1711c50727bfc32188ab0761bba33f133b0705799d8
Size: 3.29 MB - java-11-openjdk-devel-fastdebug-11.0.16.0.8-1.el9.x86_64.rpm
MD5: ff1a0e0184e111f4e22712991ee32548
SHA-256: 52326b93d6a27219a8eae61452a9bf9c572e4b77dea522fe3f1e9222445c034c
Size: 3.29 MB - java-11-openjdk-devel-slowdebug-11.0.16.0.8-1.el9.x86_64.rpm
MD5: e05e130c7b9adf54ca366e787a3502db
SHA-256: 7f806b95966f33f14ecaeecc219f05007df8f26fbb805344a17186338d00816e
Size: 3.29 MB - java-11-openjdk-fastdebug-11.0.16.0.8-1.el9.x86_64.rpm
MD5: d3b280db4da6fd6368b110ffe8406c8d
SHA-256: 44b1ee5ba0a9f4b2379b6da20a76d308976c5ac2fb6a67a6b409458f4bd89034
Size: 260.06 kB - java-11-openjdk-headless-11.0.16.0.8-1.el9.x86_64.rpm
MD5: c791b062f78ab4ea0e797c076b495fa1
SHA-256: 14ddb03764c93b8cbce30554c9caa56152430af3b648ed4a4ccbce86b3cef23b
Size: 37.91 MB - java-11-openjdk-headless-fastdebug-11.0.16.0.8-1.el9.x86_64.rpm
MD5: 40f66c4d0552d9d793ce45cf0e9b5f2c
SHA-256: 84fba5a81b22d4227d2d4da229db897b1a97b848d033d6d060e04480644b5fbf
Size: 43.46 MB - java-11-openjdk-headless-slowdebug-11.0.16.0.8-1.el9.x86_64.rpm
MD5: a42674582e5cf14b1f921666116e3a6c
SHA-256: 36b6d6ca532861a3a937630b04848302efc5b02e99791b198db263eee43cd0a1
Size: 41.39 MB - java-11-openjdk-javadoc-11.0.16.0.8-1.el9.x86_64.rpm
MD5: b1a6516c16a6a29e6155464a055ed6c5
SHA-256: fe759bb77dc5205b557268c0fb046db0aae6ed39a89db17b1f428d450be425a6
Size: 12.62 MB - java-11-openjdk-javadoc-zip-11.0.16.0.8-1.el9.x86_64.rpm
MD5: 3a55808113f6013e7710f095d16df262
SHA-256: c44a60aedcc3f216122a1360676a586593de9497a6480123ae655a3fc793eebe
Size: 41.02 MB - java-11-openjdk-jmods-11.0.16.0.8-1.el9.x86_64.rpm
MD5: 4b8b72625fbaaab07b0a74cf120cea34
SHA-256: 73967824dcf6bd7c751b353fa5c163ad82c6f4363745ca4e916662151d0807a3
Size: 300.96 MB - java-11-openjdk-jmods-fastdebug-11.0.16.0.8-1.el9.x86_64.rpm
MD5: 15ad50bbadb884e841b5d5b6a00dd3c7
SHA-256: f6678fa46859045e16294c6365d7d575333b6421ffd3a66bb45f7dc45942109d
Size: 262.03 MB - java-11-openjdk-jmods-slowdebug-11.0.16.0.8-1.el9.x86_64.rpm
MD5: 02d607219a471ddfdebc3e2cca6e4b48
SHA-256: 640a790543d3cb2c509f36e5760a28a77d7117a37cd3e95c0222becd652a9452
Size: 193.26 MB - java-11-openjdk-slowdebug-11.0.16.0.8-1.el9.x86_64.rpm
MD5: 6bf62a8087dc3be7443847a412820a60
SHA-256: 3ce5765006db5825fe7ec55f0e762e87490ee4ad8def86474a68f125a2f76505
Size: 249.23 kB - java-11-openjdk-src-11.0.16.0.8-1.el9.x86_64.rpm
MD5: bf2458ba216a505ba55237887b15b204
SHA-256: 75e2bea1bb4e4e6c18b5442f47eb795369674fc6884ab2fcdea552225246c53d
Size: 49.61 MB - java-11-openjdk-src-fastdebug-11.0.16.0.8-1.el9.x86_64.rpm
MD5: 630e39d8a96f23584c4cfb1865f2c704
SHA-256: f2f86b1327364924846000755f7e6f14ab67861c1a30a039c50c9237f1bb3122
Size: 49.62 MB - java-11-openjdk-src-slowdebug-11.0.16.0.8-1.el9.x86_64.rpm
MD5: 9c8ed59ea4552facc2329b2e91b31324
SHA-256: 7156cfe2ddf4c5a6f0f6f1bd2099a4c6a11425a2d1bb20e338e9bfa823c6b63d
Size: 49.61 MB - java-11-openjdk-static-libs-11.0.16.0.8-1.el9.x86_64.rpm
MD5: c2ca8946174aef860d646932ea4f7657
SHA-256: 8d79fbb9e35ed971407b2cd0b072dec19442bda36b65e706da920009c5d0ef8f
Size: 21.80 MB - java-11-openjdk-static-libs-fastdebug-11.0.16.0.8-1.el9.x86_64.rpm
MD5: f212c8b14a09fdb7a2ff8f8359befdeb
SHA-256: 493ef9cc520d7cbe442e57e8ae6528f5c67d22c661ed3c7081ad0e37e09bdbc3
Size: 22.06 MB - java-11-openjdk-static-libs-slowdebug-11.0.16.0.8-1.el9.x86_64.rpm
MD5: 0c2bac39b476df0f7122a6dd9284b51a
SHA-256: 9a9b06933f2caded46a24063a4bf6fed697f6ce72b180d331011737bfe6bed74
Size: 19.62 MB