java-17-openjdk-17.0.7.0.7-1.el9

エラータID: AXSA:2023-5309:06

Release date: 
Friday, April 21, 2023 - 01:18
Subject: 
java-17-openjdk-17.0.7.0.7-1.el9
Affected Channels: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.

Security Fix(es):

* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)
* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)
* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)
* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)
* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)
* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)
* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

* In FIPS mode, the list of cryptographic services and algorithms available is limited to those that are FIPS compliant. It was found that this filtering was too strict and was also excluding service attributes. These attributes are now made available in FIPS mode, as they are in non-FIPS mode. (RHBZ#2186804)
* Previously, the XML signature provider was unable to operate in FIPS mode. Following recent enhancements to FIPS mode support, the XML signature provider can now be supported. It is now enabled in FIPS mode. (RHBZ#2186811)
* The PKCS#11 provider used by FIPS mode can be supported by different PKCS#11 tokens. It was found that some PKCS#11 tokens may not be initialised fully before use, leading to an exception being thrown by the provider. With this release, this exception is now expected and handled by the FIPS support code. (RHBZ#2186807)

CVE-2023-21930
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data as well as unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).
CVE-2023-21937
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2023-21938
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.8, 21.3.4 and 22.3.0. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2023-21939
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2023-21954
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
CVE-2023-21967
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
CVE-2023-21968
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u361, 8u361-perf, 11.0.18, 17.0.6, 20; Oracle GraalVM Enterprise Edition: 20.3.9, 21.3.5 and 22.3.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).

Solution: 

Update packages.

Additional Info: 

N/A

Download: 

SRPMS
  1. java-17-openjdk-17.0.7.0.7-1.el9.src.rpm
    MD5: 1f3afe6c304348953ae606015db51d36
    SHA-256: c9eac89a10f00076f8bd7fc68a94ed9ca8fe8d62198a5f4f4c57775cbd4405ed
    Size: 61.71 MB

Asianux Server 9 for x86_64
  1. java-17-openjdk-17.0.7.0.7-1.el9.x86_64.rpm
    MD5: 576ed3f612bacb314e570a12752ddd87
    SHA-256: b64a935a81ab1ab3a918e1bbc4903e659a86342c8c168dfd5bda7d1d33152c3e
    Size: 434.04 kB
  2. java-17-openjdk-demo-17.0.7.0.7-1.el9.x86_64.rpm
    MD5: 916c939ee3289f7ac80da7eb3d8af301
    SHA-256: 0ef9f6ec4c7e3280a0884ee9bbb4b6acbd8f1ccf57785b54018fe50d2e9288c6
    Size: 3.38 MB
  3. java-17-openjdk-demo-fastdebug-17.0.7.0.7-1.el9.x86_64.rpm
    MD5: 77dbcc8b5ba033c631ac28c8696c0f06
    SHA-256: c1be863c29aa9bea5824a4c115719783486ad69f01c8bc82edaa7865e42cb380
    Size: 3.38 MB
  4. java-17-openjdk-demo-slowdebug-17.0.7.0.7-1.el9.x86_64.rpm
    MD5: b2a3ac09157728c60215558422cfe505
    SHA-256: bcfee82d799ff5728052c5eaf87bb1e5e5d6351231ba7aecd5ccb359d5b54486
    Size: 3.38 MB
  5. java-17-openjdk-devel-17.0.7.0.7-1.el9.x86_64.rpm
    MD5: 16bb8f2ef63b80bf96df62a167302f04
    SHA-256: 1f04b41b2a54d56c8e0531cf5f89d4de0139a8b74958ba2b781c9706b3890e0f
    Size: 4.72 MB
  6. java-17-openjdk-devel-fastdebug-17.0.7.0.7-1.el9.x86_64.rpm
    MD5: 205398b74d74feaa5480a2a62c1e3cda
    SHA-256: c0137712e16833dab0f2250d6bea43ab0cd6b0a4d4cd75c22e32df6bb8ec5961
    Size: 4.72 MB
  7. java-17-openjdk-devel-slowdebug-17.0.7.0.7-1.el9.x86_64.rpm
    MD5: 7d2f60d2b1e9f704043a630a76c177ed
    SHA-256: 53a4c7bb9d89a796131daaa0381b1ed2d8fdecf87ac80ded9d72a68b302a56dd
    Size: 4.72 MB
  8. java-17-openjdk-fastdebug-17.0.7.0.7-1.el9.x86_64.rpm
    MD5: 62f7cc027a866e2901b1445584b7c58f
    SHA-256: f45b18710ba53d6f82a58426db02fbb9c6b79d9abdd651e372250988eda15399
    Size: 442.38 kB
  9. java-17-openjdk-headless-17.0.7.0.7-1.el9.x86_64.rpm
    MD5: b523003b0f7a6d1f8ae028f7d04a8f2b
    SHA-256: d7ac57b37a8b1b4612b7c89b7a3e8dd56551337be2186908637f62a47db936e4
    Size: 41.71 MB
  10. java-17-openjdk-headless-fastdebug-17.0.7.0.7-1.el9.x86_64.rpm
    MD5: bc001d1f3de684348be0344c05def630
    SHA-256: 44c1e3d5a0809dbc855eb5039113a849b07c1ba100f84c482c2bee6f0afd814b
    Size: 46.84 MB
  11. java-17-openjdk-headless-slowdebug-17.0.7.0.7-1.el9.x86_64.rpm
    MD5: bec90fb9d7ef275d3b01c01102f56e19
    SHA-256: d8b8a680c9b611132f90c2da91c0fd41cae62617d3ec2fab42a10e58c1a35dc4
    Size: 45.21 MB
  12. java-17-openjdk-javadoc-17.0.7.0.7-1.el9.x86_64.rpm
    MD5: a57f7bfe72c2446350393dc4980b2cfe
    SHA-256: 4bc692c4a34e950731a4335e04c2f80d1333c940b838703d949648fa056f4e0a
    Size: 12.46 MB
  13. java-17-openjdk-javadoc-zip-17.0.7.0.7-1.el9.x86_64.rpm
    MD5: eecfe4f56099261e85f5e351ca0e3b65
    SHA-256: 43f8f59f26feab031c27a6c1b6fcc2fa57fe904c1b681b11c6dda9c13b2fa4d8
    Size: 39.41 MB
  14. java-17-openjdk-jmods-17.0.7.0.7-1.el9.x86_64.rpm
    MD5: c44120ac647968907fed92d8a082c06e
    SHA-256: 6daf184dda988ac505038bf416397576d79583b174d8423c955917dd1e2558c2
    Size: 246.09 MB
  15. java-17-openjdk-jmods-fastdebug-17.0.7.0.7-1.el9.x86_64.rpm
    MD5: 85c6ff556c0efa85e84787a25f492537
    SHA-256: 915e4a0f6e39dbcf5d5c0804693b77b1467a52cfcba02997442b47a1d34803cd
    Size: 245.79 MB
  16. java-17-openjdk-jmods-slowdebug-17.0.7.0.7-1.el9.x86_64.rpm
    MD5: a484f92bd6c1914f14343fac86f05828
    SHA-256: 91fc75619ae26668da96d392053f3a8e4ff7be3f6406a9c5e434865b8703f95d
    Size: 176.01 MB
  17. java-17-openjdk-slowdebug-17.0.7.0.7-1.el9.x86_64.rpm
    MD5: 1c4c4420c386e4ffa618b66051b36594
    SHA-256: 6960946d311b5fa105f44e8af4e3a7536911af327312000824c694e71b8eb5ba
    Size: 412.32 kB
  18. java-17-openjdk-src-17.0.7.0.7-1.el9.x86_64.rpm
    MD5: 20c22977d250cfbe97020388f5a1189f
    SHA-256: 176e74ecbc3bcee84acdb179f8c296c64a108b165dedfae34ae27743148651ec
    Size: 44.68 MB
  19. java-17-openjdk-src-fastdebug-17.0.7.0.7-1.el9.x86_64.rpm
    MD5: 7cfa1f531a0e430e048a28cc5e1e9f78
    SHA-256: 2a5784d9b346537f22e80bf0e48202f0a1254a6bb66e47e5c9c5726dd86d4b80
    Size: 44.69 MB
  20. java-17-openjdk-src-slowdebug-17.0.7.0.7-1.el9.x86_64.rpm
    MD5: a528d1aa8d9f19d3d9383a5ec50f0d25
    SHA-256: 4558614ac2c2f45c0757f359ed31b389e786545f9842c5f29b8e530f6378a4e4
    Size: 44.69 MB
  21. java-17-openjdk-static-libs-17.0.7.0.7-1.el9.x86_64.rpm
    MD5: cfc32c5787eb1ce48f84ebf14304b70c
    SHA-256: 00fa51057b9523ee822ffd1d5dbb883a27e6175545dd265829f224eced407ace
    Size: 28.00 MB
  22. java-17-openjdk-static-libs-fastdebug-17.0.7.0.7-1.el9.x86_64.rpm
    MD5: 4c7e36c4cf0ef73b891ba39b9c09b69f
    SHA-256: 9d9a17bb441a8e4ad7f015adcfe0d7d57ab47272d9763e2b35eb8356e098e69c
    Size: 28.19 MB
  23. java-17-openjdk-static-libs-slowdebug-17.0.7.0.7-1.el9.x86_64.rpm
    MD5: d04a98d5dd5a3a2b237957a0665fa230
    SHA-256: f8e3656fd02d82f6b7163d053e21a9c76fcf2893fefa57ac22c3844ad64726af
    Size: 24.79 MB