java-11-openjdk-11.0.19.0.7-1.el7

エラータID: AXSA:2023-5304:06

Release date: 
Thursday, April 20, 2023 - 01:40
Subject: 
java-11-openjdk-11.0.19.0.7-1.el7
Affected Channels: 
Asianux Server 7 for x86_64
Severity: 
High
Description: 

The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)
* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)
* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)
* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)
* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)
* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)
* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2023-21930
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
CVE-2023-21937
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2023-21938
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2023-21939
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2023-21954
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
CVE-2023-21967
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-21968
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. java-11-openjdk-11.0.19.0.7-1.el7.src.rpm
    MD5: 1938fc0e2b21fdf5ef8f70d31606015e
    SHA-256: 112ad13c998c7ffa0330e57c406cb8b005ca55ff63ab939c460e83aaa8ec0867
    Size: 75.50 MB

Asianux Server 7 for x86_64
  1. java-11-openjdk-11.0.19.0.7-1.el7.i686.rpm
    MD5: 5102bb22727012e8a58ed7e54ddf7a29
    SHA-256: c4530089b4086f2e233e58ec341d45363d76ccebd3b6ffdbbda9b55def9b2030
    Size: 234.96 kB
  2. java-11-openjdk-11.0.19.0.7-1.el7.x86_64.rpm
    MD5: 3a341bb1db1f22de7af0e04175e4db55
    SHA-256: 5736f78a062f1486ad02aa48fec06670b1a48d3844d0f6169cb2a07096895af5
    Size: 238.70 kB
  3. java-11-openjdk-debug-11.0.19.0.7-1.el7.i686.rpm
    MD5: f0bccb42001707927cef90d8a972b2af
    SHA-256: 3954b809af8d4ff45cb43d58fc05be3fefb561a1d1a0708766e5a90f78ad6e97
    Size: 237.82 kB
  4. java-11-openjdk-debug-11.0.19.0.7-1.el7.x86_64.rpm
    MD5: 5d84ee705295889b6546ef1ca42174b5
    SHA-256: c2f8f01dc873dd1e297db149ad743b34cc2ec9ec8fa4e93bc87d04317e7e98ed
    Size: 243.92 kB
  5. java-11-openjdk-demo-11.0.19.0.7-1.el7.i686.rpm
    MD5: c3eaea38d408b18530c73ce1ad908572
    SHA-256: 5369eec75ccf21b861e95afdc28d1ab7552f69e0861938f531779efcaa1c5d87
    Size: 4.36 MB
  6. java-11-openjdk-demo-11.0.19.0.7-1.el7.x86_64.rpm
    MD5: 0deebd1eb7da967af7479e9b70155643
    SHA-256: ad3f245f7f1325788a1ed0ad0d0d62c80a3db09fddf630919d91f682e032baa5
    Size: 4.37 MB
  7. java-11-openjdk-demo-debug-11.0.19.0.7-1.el7.i686.rpm
    MD5: d036bdc43f9ca312182929cec4f557d0
    SHA-256: 6a51f1100b141ad2c69d935c5cd1e66cd6bc7ca0f916a03490cdb62e65fb96ca
    Size: 4.36 MB
  8. java-11-openjdk-demo-debug-11.0.19.0.7-1.el7.x86_64.rpm
    MD5: 8cc44964059ddbf8778fcf738c6475f5
    SHA-256: d16352104a4fe86bc33d499b34b9dcfcce947e7a3faade863ca1236b599ab2e0
    Size: 4.37 MB
  9. java-11-openjdk-devel-11.0.19.0.7-1.el7.i686.rpm
    MD5: fbbdac409f29ef4bb95880c7f5e7061f
    SHA-256: 865c162c805f99602d1bcd3c4d4c723e49a858a535a2e04a463e6abc118a72e3
    Size: 3.36 MB
  10. java-11-openjdk-devel-11.0.19.0.7-1.el7.x86_64.rpm
    MD5: de92f8a518976fd5c87b1df477b9107a
    SHA-256: 991490a195fb49e2c7c54c8af85a0366ebcb2e79725ae4b9354cf69e1ad7114a
    Size: 3.38 MB
  11. java-11-openjdk-devel-debug-11.0.19.0.7-1.el7.i686.rpm
    MD5: 5990dc15696c0ce6f1ab30c35df30084
    SHA-256: c224d276c57694fb276695c830bf0bbcde881a201ca2717f19ef99b3a90e2057
    Size: 3.36 MB
  12. java-11-openjdk-devel-debug-11.0.19.0.7-1.el7.x86_64.rpm
    MD5: 5374728d103b753489a2927c3786dc04
    SHA-256: f78d289dcb2963fe15c6743ff1be3537bd7fa609c74aef10e6ca60757bafa413
    Size: 3.38 MB
  13. java-11-openjdk-headless-11.0.19.0.7-1.el7.i686.rpm
    MD5: 75edce5c20ca525aebec48ad143b9799
    SHA-256: 7a452ced0992403c92a5bfda56d4d276bc5e3252c782d63be5dd9d73d0f828a1
    Size: 35.07 MB
  14. java-11-openjdk-headless-11.0.19.0.7-1.el7.x86_64.rpm
    MD5: e26429221776d48b3b084cb2b0581faf
    SHA-256: def15c2b6bf05a64482041c71a1e8ef9d3091bcbb5ea013ad980d356d6cecd73
    Size: 38.96 MB
  15. java-11-openjdk-headless-debug-11.0.19.0.7-1.el7.i686.rpm
    MD5: 5e2fba30cbf288b26ca8cef144cf337a
    SHA-256: 6d9155beb18e126a40ae4d639e89517ce6f3855b722488b17f72ae2d739ce724
    Size: 36.97 MB
  16. java-11-openjdk-headless-debug-11.0.19.0.7-1.el7.x86_64.rpm
    MD5: 10840de4c3e443002c28e9ee8af2ee39
    SHA-256: 1c6b607d28eb31d1dce1cd7c699420047f2660fb82d6d8cbe11d9d957ea8ce47
    Size: 41.48 MB
  17. java-11-openjdk-javadoc-11.0.19.0.7-1.el7.i686.rpm
    MD5: 15d511c8bc504068a0ac5e0e57227ce0
    SHA-256: 87de06296ec197439a0ddec25b54ac88c5bb2ba2ec8bc7b26912c30833110690
    Size: 16.10 MB
  18. java-11-openjdk-javadoc-11.0.19.0.7-1.el7.x86_64.rpm
    MD5: 1ef46cb23f6f982c8f34f71833fdfc53
    SHA-256: 89b322b37e134b9599879289a2f9792f34e772e15a9da18cfded02c1b51d6745
    Size: 16.10 MB
  19. java-11-openjdk-javadoc-debug-11.0.19.0.7-1.el7.i686.rpm
    MD5: 44c6d3f295d7496b8b6f98a3e9fee867
    SHA-256: 13f9c1733c5214e2f05fb754bff414bfe9fed315a1312e5e1c9b0027825feff8
    Size: 16.10 MB
  20. java-11-openjdk-javadoc-debug-11.0.19.0.7-1.el7.x86_64.rpm
    MD5: 7fb44c12f69c5c1976bef44e4b1bee5e
    SHA-256: 9c390c5cf858b3d2cb3de01596800cd8cb92f0320758c47aac452ddc0e77fdfe
    Size: 16.10 MB
  21. java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el7.i686.rpm
    MD5: b7b8b0f3821d19d0f875455ca354f518
    SHA-256: 3b47fcf1321a1efbbd955c895cc264f0d2e40622ee16ee852679d8c13a05a354
    Size: 42.08 MB
  22. java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el7.x86_64.rpm
    MD5: 89be8f823628efd923bfa93420d8e0fd
    SHA-256: 43f158724683312a99951f399fa36736cece9e168ee92984121fd16ec3761dd0
    Size: 42.05 MB
  23. java-11-openjdk-javadoc-zip-debug-11.0.19.0.7-1.el7.i686.rpm
    MD5: e6498214eb6d2a9a2c1b6a0f41554f83
    SHA-256: f555a9bbc39e60a568c45b60c390903c3944cb96a3e508cc23ac2eedd99f232e
    Size: 42.08 MB
  24. java-11-openjdk-javadoc-zip-debug-11.0.19.0.7-1.el7.x86_64.rpm
    MD5: 6a795e0426d8f925a7eb1d8ff1a8fc51
    SHA-256: 9a9925040a3aa8866679a90196c74ee5a3cf4cae67cbef39035abb80d0699295
    Size: 42.05 MB
  25. java-11-openjdk-jmods-11.0.19.0.7-1.el7.i686.rpm
    MD5: eccb71a7d60653e697092cb7330b088e
    SHA-256: 53421f46d82e2926292293d204465524c2903d32ca578c4a3001b32431d9f813
    Size: 257.96 MB
  26. java-11-openjdk-jmods-11.0.19.0.7-1.el7.x86_64.rpm
    MD5: 921bebaae6bdda8f84ca04eb5cbfae4b
    SHA-256: 9fd894255afdf28d1ab146ab12ac33c470f6711a2445e3bff0d87034327b65ab
    Size: 306.12 MB
  27. java-11-openjdk-jmods-debug-11.0.19.0.7-1.el7.i686.rpm
    MD5: 58ad3be9f928db14fe633175170552e2
    SHA-256: d279ad1d47933470c474d92f03799fbf1e04aca92f32019488c8fd688e82e7e0
    Size: 147.14 MB
  28. java-11-openjdk-jmods-debug-11.0.19.0.7-1.el7.x86_64.rpm
    MD5: 7bbfbb183bae2e48d90a6abfb91e16f9
    SHA-256: cbf7078f64502f87644ae088aa8fa09f47f1eec72466d21997d36a5047fa9794
    Size: 174.16 MB
  29. java-11-openjdk-src-11.0.19.0.7-1.el7.i686.rpm
    MD5: 534a70aecabdc460c9a81d73bb64a70c
    SHA-256: bf71ada60343a09ca52761d99643e10169c02eb210a8ce031e9517494b0c4975
    Size: 45.70 MB
  30. java-11-openjdk-src-11.0.19.0.7-1.el7.x86_64.rpm
    MD5: 64d2c34f109638b4d88e0973cbbd99c9
    SHA-256: ecb32f2ed9d857453552c5c04627d2319a4efeeacacce3e5682f45cd656b11fd
    Size: 50.43 MB
  31. java-11-openjdk-src-debug-11.0.19.0.7-1.el7.i686.rpm
    MD5: 205fd2cba354a3a8e739c68f53655fe6
    SHA-256: 12fd27a11c900756080acf8aa9f93253ae7bcff39755995d2d4e6c178d65a7ba
    Size: 45.70 MB
  32. java-11-openjdk-src-debug-11.0.19.0.7-1.el7.x86_64.rpm
    MD5: 40754470d7e6de565736c19e5be16e2e
    SHA-256: 109dae01e6dbc5467fba443a2b55a02f2ceb6c7f8af03365f2921bd48da4dc43
    Size: 50.44 MB