Lucene search

K
centosCentOS ProjectCESA-2022:7008
HistoryOct 26, 2022 - 2:18 p.m.

java security update

2022-10-2614:18:08
CentOS Project
lists.centos.org
92
java 11
openjdk
security update
buffer overflow
excessive memory allocation
http server
ntlm client
sni caching
cve-2022-21618
cve-2022-21626
cve-2022-21628
cve-2022-21619
cve-2022-21624
cve-2022-39399
red hat advisory

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

EPSS

0.002

Percentile

59.5%

CentOS Errata and Security Advisory CESA-2022:7008

The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

  • OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618)

  • OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)

  • OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)

  • OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)

  • OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)

  • OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) (BZ#2130373)

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2022-October/086329.html

Affected packages:
java-11-openjdk
java-11-openjdk-demo
java-11-openjdk-devel
java-11-openjdk-headless
java-11-openjdk-javadoc
java-11-openjdk-javadoc-zip
java-11-openjdk-jmods
java-11-openjdk-src
java-11-openjdk-static-libs

Upstream details at:
https://access.redhat.com/errata/RHSA-2022:7008

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

EPSS

0.002

Percentile

59.5%