java-11-openjdk-11.0.19.0.7-1.el8

エラータID: AXSA:2023-5306:08

Release date: 
Thursday, April 20, 2023 - 09:21
Subject: 
java-11-openjdk-11.0.19.0.7-1.el8
Affected Channels: 
Asianux Server 8 for x86_64
Severity: 
High
Description: 

The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)
* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)
* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)
* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)
* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)
* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)
* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2023-21930
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
CVE-2023-21937
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2023-21938
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2023-21939
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2023-21954
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
CVE-2023-21967
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-21968
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. java-11-openjdk-11.0.19.0.7-1.el8.src.rpm
    MD5: b820451c09a20bcf5dbefc75e3b1da87
    SHA-256: 9023a7c6857d74e93103f05c14e83be9143eb06c2305c6e32cc8fb0a0a94d0a6
    Size: 75.54 MB

Asianux Server 8 for x86_64
  1. java-11-openjdk-11.0.19.0.7-1.el8.x86_64.rpm
    MD5: c64dcfea284062dde0aa6f54d18cfe00
    SHA-256: 0fbedf0c984c5e47c9e5f8cb416c238f6bb63041b4795e8fabd83338933d8414
    Size: 469.76 kB
  2. java-11-openjdk-demo-11.0.19.0.7-1.el8.x86_64.rpm
    MD5: eb06b070e6f6e2cfa23f322de2310cdf
    SHA-256: 6f41b1ab96161da1719e0f5750f5155399b218269537d54c8fa053ffda593234
    Size: 4.39 MB
  3. java-11-openjdk-demo-fastdebug-11.0.19.0.7-1.el8.x86_64.rpm
    MD5: 06538d3ca071a3681640ea495cba8e5f
    SHA-256: 07160c3a452e1f7a6717bb02a8a0d9b0ba7b8e111cf580969e1c3d7e26e1cca6
    Size: 4.39 MB
  4. java-11-openjdk-demo-slowdebug-11.0.19.0.7-1.el8.x86_64.rpm
    MD5: 1475516779fa412504fc51367a987ba3
    SHA-256: cae61c8f1d823933a73e3f29c378866f6c1c5f3e4135d54c4a90d7320e4a4e8a
    Size: 4.39 MB
  5. java-11-openjdk-devel-11.0.19.0.7-1.el8.x86_64.rpm
    MD5: ea6ee7a82f037c6b3f85797a042b281b
    SHA-256: 99742be5e652509f391a2f66c7681c4e6303a85aa3780c891da7fa7834f85249
    Size: 3.39 MB
  6. java-11-openjdk-devel-fastdebug-11.0.19.0.7-1.el8.x86_64.rpm
    MD5: cea30e3cba837fbfe07c6f4acc7c119d
    SHA-256: cbd8098f6ce23d22410e00539f0facd82118654bdb2ccde5fe0d3fdc55060629
    Size: 3.39 MB
  7. java-11-openjdk-devel-slowdebug-11.0.19.0.7-1.el8.x86_64.rpm
    MD5: 035469979ff19b34400d76a2b751e4c2
    SHA-256: 7da207badcd97a7a3b3a88c0b0c8ab129ce79374e27b595b173a3e2c35e61f2e
    Size: 3.39 MB
  8. java-11-openjdk-fastdebug-11.0.19.0.7-1.el8.x86_64.rpm
    MD5: 68eb140706c59b5527e7aa9926832f0e
    SHA-256: d398b0e4465ff9e6d6385647a9a7f3bdb9d811b6fc312e916bd31969e21045fc
    Size: 483.00 kB
  9. java-11-openjdk-headless-11.0.19.0.7-1.el8.x86_64.rpm
    MD5: 663a04a04c7b28cf25c204f4734effc9
    SHA-256: 5af021758911c2129069eeeae073cb32341a13bb16cc2e9c785e55ff15bc7f04
    Size: 41.38 MB
  10. java-11-openjdk-headless-fastdebug-11.0.19.0.7-1.el8.x86_64.rpm
    MD5: de289c5f22efb304f06d380618cde369
    SHA-256: c3cff95a7f0182b0846e2fa9de413ab27a9ca7daa4746f7f0127ff4bd895cff8
    Size: 46.38 MB
  11. java-11-openjdk-headless-slowdebug-11.0.19.0.7-1.el8.x86_64.rpm
    MD5: 503db5f884fc2302bec35d5c3918eab6
    SHA-256: 46ab0a229c15357978c17c8a350e01e38df1a2f95c1ab0c43e4397f6fc62ca5e
    Size: 45.72 MB
  12. java-11-openjdk-javadoc-11.0.19.0.7-1.el8.x86_64.rpm
    MD5: 00fa669e2023aa59763602e4390d0b08
    SHA-256: d1ee666282771893c915cbd063b45638eaef65e6ac37c17821cac1694037d10f
    Size: 16.00 MB
  13. java-11-openjdk-javadoc-zip-11.0.19.0.7-1.el8.x86_64.rpm
    MD5: 04d93d75f26082ccfcd5b6544c64d090
    SHA-256: c95deb821165e61a70e814553e6c6cf90642fabd4bafef872c48ee59d21e10b3
    Size: 42.10 MB
  14. java-11-openjdk-jmods-11.0.19.0.7-1.el8.x86_64.rpm
    MD5: ed15326e854f4c390518f73711068cb1
    SHA-256: 0f36bf4eb742ee728daae2756b5eb6b5b5c3e99959cb0bc59400d7d505ba3692
    Size: 337.98 MB
  15. java-11-openjdk-jmods-fastdebug-11.0.19.0.7-1.el8.x86_64.rpm
    MD5: aa57a4090b234de68d27193a574f3dc4
    SHA-256: 859f8771ec5ce8125e2889fe9f0777159163aeab4a38824736cbd91febbaba82
    Size: 293.01 MB
  16. java-11-openjdk-jmods-slowdebug-11.0.19.0.7-1.el8.x86_64.rpm
    MD5: 9dd64f4ef7d7d437bf5351276e087dd5
    SHA-256: c60dd2532af1b11d3dc966e43b66b9e689aa84550ea8b6e38477940f85877172
    Size: 225.87 MB
  17. java-11-openjdk-slowdebug-11.0.19.0.7-1.el8.x86_64.rpm
    MD5: 0be8b251036e4a2e51bfa838a2ab8e9d
    SHA-256: 68646cf0d7ffb7dc6c4ca32f1a05d3bf73d6f10c8fc1b14f4c6a9df5779cb08b
    Size: 456.93 kB
  18. java-11-openjdk-src-11.0.19.0.7-1.el8.x86_64.rpm
    MD5: 421d84df56228b220bb8d90ed5a03016
    SHA-256: 3c7a1cdea24c53bc847795c3c3fb9b55f6ed4cca0d2fd3dbed3f3cef9f3bdf28
    Size: 50.48 MB
  19. java-11-openjdk-src-fastdebug-11.0.19.0.7-1.el8.x86_64.rpm
    MD5: dd4ce9e58fe32c86689014e7fdd4e516
    SHA-256: 0bac37f791a0df6608c8021dc43e1ed67921ab5d447c67471d5ec036db351900
    Size: 50.48 MB
  20. java-11-openjdk-src-slowdebug-11.0.19.0.7-1.el8.x86_64.rpm
    MD5: 1c87df80bade0e8ada9d87f03a1e161f
    SHA-256: aaf387840bb9c529d45ccb8b80f7c4e76d88fc3e0ed23148e7a99ace5641eaf3
    Size: 50.48 MB
  21. java-11-openjdk-static-libs-11.0.19.0.7-1.el8.x86_64.rpm
    MD5: 244e39bbc00949bb18c6ff3a31425c75
    SHA-256: bca498bf9a645c5f49d3dc35cc5f4e62fac186eb9403ba6c4180eb5f60de6d98
    Size: 30.19 MB
  22. java-11-openjdk-static-libs-fastdebug-11.0.19.0.7-1.el8.x86_64.rpm
    MD5: b1f06d1977a85e95c0bfb0603b2e5d2c
    SHA-256: bd77d9852510aafa5ef8e8951240460e0b80d292196a2a498fef85546ef8eab0
    Size: 30.46 MB
  23. java-11-openjdk-static-libs-slowdebug-11.0.19.0.7-1.el8.x86_64.rpm
    MD5: 19acd46959988dd0c1cff4653e6a612b
    SHA-256: f0881e26949f53aeb00b4e468a0debf865c6b692c759ef22dd2f44327b19da0b
    Size: 26.00 MB