java-11-openjdk-11.0.20.0.8-2.el8
エラータID: AXSA:2023-6262:16
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
Security Fix(es):
* OpenJDK: ZIP file parsing infinite loop (8302483) (CVE-2023-22036)
* OpenJDK: weakness in AES implementation (8308682) (CVE-2023-22041)
* OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049)
* harfbuzz: OpenJDK: O(n^2) growth via consecutive marks (CVE-2023-25193)
* OpenJDK: HTTP client insufficient file name validation (8302475) (CVE-2023-22006)
* OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
* A virtual machine crash was observed in JDK 11.0.19 when executing the GregorianCalender.computeTime() method (JDK-8307683). It was found
that although the root cause of the crash is an old issue, a recent fix for a rare issue in the C2 compiler (JDK-8297951) made the crash much more likely. To mitigate this, the fix has been reverted in JDK 11.0.20 and will be reapplied once JDK-8307683 is resolved. (RHBZ#2222493)
* Prepare for the next quarterly OpenJDK upstream release (2023-07, 11.0.20) [rhel-8] (BZ#2223101)
CVE-2023-22006
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 11.0.19, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and 20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
CVE-2023-22036
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Utility). Supported versions that are affected are Oracle Java SE: 11.0.19, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and 20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
CVE-2023-22041
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u371-perf, 11.0.19, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and 20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK executes to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
CVE-2023-22045
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u371, 8u371-perf, 11.0.19, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and 20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
CVE-2023-22049
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u371, 8u371-perf, 11.0.19, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and 20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2023-25193
hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.
Update packages.
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Networking). Supported versions that are affected are Oracle Java SE: 11.0.19, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and 20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks require human interaction from a person other than the attacker. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.1 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Utility). Supported versions that are affected are Oracle Java SE: 11.0.19, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and 20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u371-perf, 11.0.19, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and 20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK executes to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u371, 8u371-perf, 11.0.19, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and 20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 8u371, 8u371-perf, 11.0.19, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and 20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
hb-ot-layout-gsubgpos.hh in HarfBuzz through 6.0.0 allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.
N/A
SRPMS
- java-11-openjdk-11.0.20.0.8-2.el8.src.rpm
MD5: faf4df67f5d00804eda1c7c359851446
SHA-256: 0094d184e83d8d1ecbe06e773ca925059622b35ddf98150958f99f2e2c2bea16
Size: 68.17 MB
Asianux Server 8 for x86_64
- java-11-openjdk-11.0.20.0.8-2.el8.x86_64.rpm
MD5: dc505c043a28ca71d1ea65625011fad5
SHA-256: e8b8d73fb32cc18d386e573d29b0a9deb75386e0846a7c18bc87dddddc082a88
Size: 471.87 kB - java-11-openjdk-demo-11.0.20.0.8-2.el8.x86_64.rpm
MD5: bc974d707d4e3a14c14472058f1640f8
SHA-256: c076ffdc0c61df9f5ac89798f11a6f6dea76adaaaf1dd347535b86224d6bbe24
Size: 4.39 MB - java-11-openjdk-demo-fastdebug-11.0.20.0.8-2.el8.x86_64.rpm
MD5: 342ec62484c81b06d03694ff83d71c00
SHA-256: 0ab3a97f506e1718ee993e646d5074dad9bfcd805606344e48f5df78b88c4213
Size: 4.39 MB - java-11-openjdk-demo-slowdebug-11.0.20.0.8-2.el8.x86_64.rpm
MD5: 03ec0b015f63f98c0eebb6ca08b6b98a
SHA-256: 29b2f903116e77cf97f4bb0cf3a39265c6545838a0933d0fe9cc33c202188535
Size: 4.39 MB - java-11-openjdk-devel-11.0.20.0.8-2.el8.x86_64.rpm
MD5: 09941f23a5ef65144320614339ee6361
SHA-256: 4f07eb1562f603a380aba2adbe1aff34ba7e595eb64a00096da42c9774aaa24d
Size: 3.39 MB - java-11-openjdk-devel-fastdebug-11.0.20.0.8-2.el8.x86_64.rpm
MD5: f5990ce28d504d7aea605d48390f23ef
SHA-256: 806b21c5de353e14aeadcd6840b64e19b11c78ec270536991d9a4798bbebd40d
Size: 3.39 MB - java-11-openjdk-devel-slowdebug-11.0.20.0.8-2.el8.x86_64.rpm
MD5: 8665d5a564767d140e6c31ce73560e53
SHA-256: 93f95253ba8dff81e8b514a1ce3b2f960b0a07c001666735a31bb0546498667f
Size: 3.39 MB - java-11-openjdk-fastdebug-11.0.20.0.8-2.el8.x86_64.rpm
MD5: 06da8a6e186771ad57437a02a051d6a4
SHA-256: 022dd38671dfcec82eb2dd1259a4f92f76bef454f2cf615ce34bc3c36c0aab18
Size: 485.20 kB - java-11-openjdk-headless-11.0.20.0.8-2.el8.x86_64.rpm
MD5: cdc9beec065b7f2be0cb24e85074bb6f
SHA-256: bea65b327fcb2d81fa1c777e1629a628cfa554b5a7dc429d2957fe3d682928f9
Size: 41.53 MB - java-11-openjdk-headless-fastdebug-11.0.20.0.8-2.el8.x86_64.rpm
MD5: 528e34def618a77ce36d6f29238d6cdf
SHA-256: e4ad88d449632002096c9e36f52646a8b978f0f5411f6d463061247670e86a37
Size: 46.53 MB - java-11-openjdk-headless-slowdebug-11.0.20.0.8-2.el8.x86_64.rpm
MD5: 8ec152db049b121c7c9befae6a6a5eaf
SHA-256: 50fcee0b59a465ec9c2962c9653be569629a916e4aa9ef05ac13924ecb0f143f
Size: 45.99 MB - java-11-openjdk-javadoc-11.0.20.0.8-2.el8.x86_64.rpm
MD5: 0a2a12c44891a517512dcc2573b086cc
SHA-256: 9c1c93a245e6971c12311a5cd929d8eeaa8d341275d2665a56eb902932b8c453
Size: 16.00 MB - java-11-openjdk-javadoc-zip-11.0.20.0.8-2.el8.x86_64.rpm
MD5: 62c105651656fcba06007ae4a13d584e
SHA-256: 1b75f24686e387b39791051355ea00b5289550041911b18db25d3d201c12b26f
Size: 42.10 MB - java-11-openjdk-jmods-11.0.20.0.8-2.el8.x86_64.rpm
MD5: f3dd2319bd84cb6b1ca1cc101bdbea6f
SHA-256: e84fe9e1f47173bcac8baa1221f414fe4a540e2841bb9292aafcd4b956ea52b7
Size: 341.63 MB - java-11-openjdk-jmods-fastdebug-11.0.20.0.8-2.el8.x86_64.rpm
MD5: db259ed73fca6360d4d1b208ba9106f8
SHA-256: 0d5cb81ac279e6d7fb683a40319700dc00dd85d66df7401637d61a23412b020e
Size: 296.65 MB - java-11-openjdk-jmods-slowdebug-11.0.20.0.8-2.el8.x86_64.rpm
MD5: bac4d588e9b575f023190174789b07ec
SHA-256: bb9927b275bb00e0d84a96b14b41ee7352a9d8053091ffda8cc1a7f0dd97aed9
Size: 229.12 MB - java-11-openjdk-slowdebug-11.0.20.0.8-2.el8.x86_64.rpm
MD5: 29aaae072dea4acdc296e988bfd15124
SHA-256: ba419e016c857c7851bbf3a6bc77b332212db10c373ab301467821b57095d19c
Size: 459.18 kB - java-11-openjdk-src-11.0.20.0.8-2.el8.x86_64.rpm
MD5: cfd0bb90cc77e530b8d1c4be0ef84303
SHA-256: 6b13f9ca013b53df9f9d299e91cd6ae937dfad44dc1b5b950a6ac54e94725d0f
Size: 50.49 MB - java-11-openjdk-src-fastdebug-11.0.20.0.8-2.el8.x86_64.rpm
MD5: 24e33b97404f54ef3e63993c5a33d546
SHA-256: 1a368c3b3d1a2b04579a4f4859bbc103e01450f251e9e0316a8d34d748f0080a
Size: 50.49 MB - java-11-openjdk-src-slowdebug-11.0.20.0.8-2.el8.x86_64.rpm
MD5: 3a945e0715ca0316324fa9b11f40cd18
SHA-256: eeacaeb25ca14f3faa99c0b9a97972041740c3f4d485c5406d72839140ac7a8d
Size: 50.49 MB - java-11-openjdk-static-libs-11.0.20.0.8-2.el8.x86_64.rpm
MD5: 07ba49a361b6d7ba3340c091601ecedc
SHA-256: 97bbac3bc2e1b83c3bcd664df113289e28048ff1c32951808840d45b6f50dd7e
Size: 35.00 MB - java-11-openjdk-static-libs-fastdebug-11.0.20.0.8-2.el8.x86_64.rpm
MD5: ad77899bbd0579e8af98288f29c88001
SHA-256: ac13945cf296ca4c97327c699bc400df4dc30ac3421d354a6fde60c2d017f34c
Size: 35.26 MB - java-11-openjdk-static-libs-slowdebug-11.0.20.0.8-2.el8.x86_64.rpm
MD5: 4167878dbd9b11e8998ccc0cd13ec8c3
SHA-256: 69a2c979ff6efaf03bb282b603990bbf85bda56d51ef92794a4eb8d3ca9d0253
Size: 30.79 MB