java-21-openjdk-21.0.1.0.12-2.el9.ML.1
エラータID: AXSA:2023-7024:01
The java-21-openjdk packages provide the OpenJDK 21 Java Runtime Environment and the OpenJDK 21 Java Software Development Kit.
Security Fix(es):
* OpenJDK: memory corruption issue on x86_64 with AVX-512 (8317121) (CVE-2023-22025)
* OpenJDK: certificate path validation issue during client authentication (8309966) (CVE-2023-22081)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2023-22025
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition, product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u381-perf, 17.0.8, 21; Oracle GraalVM for JDK: 17.0.8, 21; Oracle GraalVM Enterprise Edition: 21.3.7 and 22.3.3. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition,. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition, accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
CVE-2023-22081
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u381, 8u381-perf, 11.0.20, 17.0.8, 21; Oracle GraalVM for JDK: 17.0.8, 21; Oracle GraalVM Enterprise Edition: 20.3.11, 21.3.7 and 22.3.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
Update packages.
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition, product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u381-perf, 17.0.8, 21; Oracle GraalVM for JDK: 17.0.8, 21; Oracle GraalVM Enterprise Edition: 21.3.7 and 22.3.3. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition,. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition, accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JSSE). Supported versions that are affected are Oracle Java SE: 8u381, 8u381-perf, 11.0.20, 17.0.8, 21; Oracle GraalVM for JDK: 17.0.8, 21; Oracle GraalVM Enterprise Edition: 20.3.11, 21.3.7 and 22.3.3. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
N/A
SRPMS
- java-21-openjdk-21.0.1.0.12-2.el9.ML.1.src.rpm
MD5: 394ddd361d5e8c450f9648504dda17ac
SHA-256: 196976e0ecf20ee27ec028f1c8afe38bc8e30d076142c2d1b4768d07e8db1282
Size: 65.70 MB
Asianux Server 9 for x86_64
- java-21-openjdk-21.0.1.0.12-2.el9.ML.1.x86_64.rpm
MD5: 3d1739bb0855c95259a69b047b07e52a
SHA-256: 3206551fc71a1135b5903fa2f71dd26139788cd51b2433d876cf506f16d93f5a
Size: 444.49 kB - java-21-openjdk-demo-21.0.1.0.12-2.el9.ML.1.x86_64.rpm
MD5: 65b51bbe792fbe28fca4fd39e3aff7ff
SHA-256: 48b8811a28e2afae2924c5d1746d502ef380c273ee3cab60774be6eb2f4b42cc
Size: 3.14 MB - java-21-openjdk-devel-21.0.1.0.12-2.el9.ML.1.x86_64.rpm
MD5: a665f9d011ea63f014e6de509d72e964
SHA-256: 8eb961b342d1c69090498554580354265d80b1541da0485865c2d3e3551119aa
Size: 4.98 MB - java-21-openjdk-headless-21.0.1.0.12-2.el9.ML.1.x86_64.rpm
MD5: e0abef189d20922dbd2dbb4716b06b76
SHA-256: 5bd56ed8ec401c7a9c7a2f270f76d339b4ff74c0f01898a7cf6e6ccaad66247f
Size: 48.38 MB - java-21-openjdk-javadoc-21.0.1.0.12-2.el9.ML.1.x86_64.rpm
MD5: 8116821320dc0ef26261398d89be95df
SHA-256: bf7157c6764dbe2c3f730ff4043717b1c48e7b976009492ca3765f2489d1ad8b
Size: 12.75 MB - java-21-openjdk-javadoc-zip-21.0.1.0.12-2.el9.ML.1.x86_64.rpm
MD5: f24aae5e3314eaf67cb347568f69c547
SHA-256: 62d0b918f43edde05ad7eacc509191c5a2905c8d4d8c9c23081754f6968fa137
Size: 40.61 MB - java-21-openjdk-jmods-21.0.1.0.12-2.el9.ML.1.x86_64.rpm
MD5: 9bb109d7433ead86edd221a932da5d5a
SHA-256: 2cdc5da6a362adf1ab4ce96fe054d56244ad0d53d212a6cc888a3c8ea5e71704
Size: 306.13 MB - java-21-openjdk-src-21.0.1.0.12-2.el9.ML.1.x86_64.rpm
MD5: 333aeca9abf34c2fad03e27d66ed0d7a
SHA-256: 3559ec972604e0fbafdfa6b0bdcb016bfac5a4a30969a030f0c9996561ca47c7
Size: 46.65 MB - java-21-openjdk-static-libs-21.0.1.0.12-2.el9.ML.1.x86_64.rpm
MD5: 959a527b93753a3424ccb2275a8dc15e
SHA-256: a1bff0a36533d6d130b24499d03a6df5011e4f944227613a86995e68033a0307
Size: 35.28 MB