java-11-openjdk-11.0.19.0.7-1.el9

エラータID: AXSA:2023-5305:07

Release date: 
Thursday, April 20, 2023 - 06:33
Subject: 
java-11-openjdk-11.0.19.0.7-1.el9
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)
* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)
* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)
* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)
* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)
* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)
* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2023-21930
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
CVE-2023-21937
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2023-21938
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2023-21939
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2023-21954
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
CVE-2023-21967
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-21968
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. java-11-openjdk-11.0.19.0.7-1.el9.src.rpm
    MD5: 4d617839dcca03c34e7df907aec15ea9
    SHA-256: 5de8762f09cceee6ea41bd4c9cc26c889d1c969e0de81e9862a49a234407f531
    Size: 75.50 MB

Asianux Server 9 for x86_64
  1. java-11-openjdk-11.0.19.0.7-1.el9.x86_64.rpm
    MD5: 763fa89aa9b39d99e6df3de410cb0673
    SHA-256: 2567fe7d1023ff9cec12ab3c43c34ae0649897c33e47464ef7f7e8161d1b39a4
    Size: 438.85 kB
  2. java-11-openjdk-demo-11.0.19.0.7-1.el9.x86_64.rpm
    MD5: 077009df20068e62d68e8cdbe440a287
    SHA-256: 4ef6fd7055a1a7025699028d78c922e9dfd834ad516d091950de3d9a49fdd057
    Size: 4.32 MB
  3. java-11-openjdk-demo-fastdebug-11.0.19.0.7-1.el9.x86_64.rpm
    MD5: 75257b7cf56570d721c8b6344a46958c
    SHA-256: b91aadc2951f0544927d15b7d7fa1d4eb20ed10a4c2503f0e22766be31b13772
    Size: 4.32 MB
  4. java-11-openjdk-demo-slowdebug-11.0.19.0.7-1.el9.x86_64.rpm
    MD5: db0281285645dafae189d37b55d38687
    SHA-256: 6b6a4ff7b95c74eaf8e3c05a5701cad03355b00b173512687d8cde423a7e5338
    Size: 4.32 MB
  5. java-11-openjdk-devel-11.0.19.0.7-1.el9.x86_64.rpm
    MD5: eff0503e208e17cbd7736769857f5c9d
    SHA-256: b565bd6c2bdccc657b4386504eaa8879ce6b6271e12b3b46da8a2e1478011d15
    Size: 3.29 MB
  6. java-11-openjdk-devel-fastdebug-11.0.19.0.7-1.el9.x86_64.rpm
    MD5: 01b4e5858de0c5bd130bb3a679b7c4b2
    SHA-256: 2430b91f19c1bfa17dfa6a3950effabfbb9381c4e49c4da0825bb8e037ec46a0
    Size: 3.29 MB
  7. java-11-openjdk-devel-slowdebug-11.0.19.0.7-1.el9.x86_64.rpm
    MD5: e1417774aa8f6476196201d15e4bc9a1
    SHA-256: e04666d586c9a835dc76494b517c735d7fdb9b6f4e390854a7e815402a80356f
    Size: 3.29 MB
  8. java-11-openjdk-fastdebug-11.0.19.0.7-1.el9.x86_64.rpm
    MD5: b6940995d1c5fa4ee0d1e14a7dcc7991
    SHA-256: 830a698abe643ac0ce66073fe1235a97874e077506eac3d9e94158fbc60ec693
    Size: 453.90 kB
  9. java-11-openjdk-headless-11.0.19.0.7-1.el9.x86_64.rpm
    MD5: 6741c0597c1e9ba6742e5b5769e062c6
    SHA-256: bb259f3739fe92f960ae1663e4488ae69ae56435f1f7e8cd7bdd3119283a45e8
    Size: 39.56 MB
  10. java-11-openjdk-headless-fastdebug-11.0.19.0.7-1.el9.x86_64.rpm
    MD5: eae858efb1a676aa938715e3d25f1c1a
    SHA-256: 9f07661f0598ae9afe421dde2720c557468fa6383d20c6362268e3ea3dfbf723
    Size: 45.07 MB
  11. java-11-openjdk-headless-slowdebug-11.0.19.0.7-1.el9.x86_64.rpm
    MD5: e0e26529affa4ac53bf077c65761736d
    SHA-256: 464047681d38dcadf055e6e986f0e97370dfc32fa77c43e4ba5f9b55759f422a
    Size: 43.92 MB
  12. java-11-openjdk-javadoc-11.0.19.0.7-1.el9.x86_64.rpm
    MD5: 2841f5ef7389c5c9ba3870e2ba2123b2
    SHA-256: 78877e6c0f88d6524c2595cd1f157f5f653dae9bf15ce9ced11f62ef69afccc0
    Size: 12.61 MB
  13. java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el9.x86_64.rpm
    MD5: a3764b10cd6494fc58a8a61379dae0c6
    SHA-256: e0cc659ed2939505c8150cd22aac63c374a1d1a683bd420d18092256eba130c8
    Size: 41.11 MB
  14. java-11-openjdk-jmods-11.0.19.0.7-1.el9.x86_64.rpm
    MD5: 94abfbf7318b072852ada615c0b4d6fb
    SHA-256: d699c4811c6d0104a44213a7b25b86e4793828a2bb414e23dd98e13890dd7bb2
    Size: 319.30 MB
  15. java-11-openjdk-jmods-fastdebug-11.0.19.0.7-1.el9.x86_64.rpm
    MD5: db5ea584b613fba118085605c4cf3dce
    SHA-256: b0a8002cad4782803bdb9e93f3b50f22bacd5f777d33d2f4dbafbc3f89edded6
    Size: 280.22 MB
  16. java-11-openjdk-jmods-slowdebug-11.0.19.0.7-1.el9.x86_64.rpm
    MD5: 759e748fbf6a30b02f82db03f0321a44
    SHA-256: f5435961012a64e0c3a4e7243e12a3bf7ed0082e88d72217ee97e8d1ce629eb5
    Size: 208.23 MB
  17. java-11-openjdk-slowdebug-11.0.19.0.7-1.el9.x86_64.rpm
    MD5: 31c4ef9a58aebe391c3eb7cdb7deb3c5
    SHA-256: 8b5bacc0bdd50d7dffe0d87d0171798067680b03590559a2c9c4f0b2e679485c
    Size: 424.11 kB
  18. java-11-openjdk-src-11.0.19.0.7-1.el9.x86_64.rpm
    MD5: ae81b71e0a4090f64873b144fc8a3855
    SHA-256: 17281f98597643966987976ca05558e3a44ad41e43f4c917f0f86f73c2c5480e
    Size: 49.65 MB
  19. java-11-openjdk-src-fastdebug-11.0.19.0.7-1.el9.x86_64.rpm
    MD5: 98c4de8b403d54042d61b10614f5df0b
    SHA-256: 2012097eeafef8e57f553a7e0874880a8eb0e17df94dbfa8536ae12ae0672430
    Size: 49.65 MB
  20. java-11-openjdk-src-slowdebug-11.0.19.0.7-1.el9.x86_64.rpm
    MD5: f5cf1db6519ef4a8bf5438b04eaacabe
    SHA-256: 93da1ced75c061409a33aaa2cc3bbb7e6c399474c675f62336376d58de04127a
    Size: 49.65 MB
  21. java-11-openjdk-static-libs-11.0.19.0.7-1.el9.x86_64.rpm
    MD5: 31b8a0fc6b90e603767d4692484a68f9
    SHA-256: cbe11b328574ad1795b9c7769aa4066f44d57e501c83c8c6d51636a801005ce2
    Size: 26.83 MB
  22. java-11-openjdk-static-libs-fastdebug-11.0.19.0.7-1.el9.x86_64.rpm
    MD5: 26c48272989aec5ff8fc7050c372d9ba
    SHA-256: de1554b9bfe242ede76f0d8084d85f50728424019ed106943e60e1a39c14bb76
    Size: 27.18 MB
  23. java-11-openjdk-static-libs-slowdebug-11.0.19.0.7-1.el9.x86_64.rpm
    MD5: 6eef2e56bdd568d8851b119d17ac3916
    SHA-256: 8a80f7133a1d984b9707304c4bf87141602f8162d34da32b7e02e122ae7e82e2
    Size: 24.01 MB