Synopsis:          Moderate: java-11-openjdk security and bug fix update
Advisory ID:       SLSA-2022:7008-1
Issue Date:        2022-10-20
CVE Numbers:       CVE-2022-21619
                   CVE-2022-21626
                   CVE-2022-21624
                   CVE-2022-21628
                   CVE-2022-39399
                   CVE-2022-21618
--

Security Fix(es):

* OpenJDK: improper MultiByte conversion can lead to buffer overflow
(JGSS,  8286077) (CVE-2022-21618)

* OpenJDK: excessive memory allocation in X.509 certificate parsing
(Security, 8286533) (CVE-2022-21626)

* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server,
8286918) (CVE-2022-21628)

* OpenJDK: improper handling of long NTLM client hostnames (Security,
8286526) (CVE-2022-21619)

* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI,
8286910) (CVE-2022-21624)

* OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366)
(CVE-2022-39399)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE

Bug Fix(es):

* Prepare for the next quarterly OpenJDK upstream release (2022-10,
11.0.17)
--

SL7
  x86_64
    java-11-openjdk-11.0.17.0.8-2.el7_9.i686.rpm
    java-11-openjdk-11.0.17.0.8-2.el7_9.x86_64.rpm
    java-11-openjdk-debuginfo-11.0.17.0.8-2.el7_9.i686.rpm
    java-11-openjdk-debuginfo-11.0.17.0.8-2.el7_9.x86_64.rpm
    java-11-openjdk-headless-11.0.17.0.8-2.el7_9.i686.rpm
    java-11-openjdk-headless-11.0.17.0.8-2.el7_9.x86_64.rpm
    java-11-openjdk-demo-11.0.17.0.8-2.el7_9.i686.rpm
    java-11-openjdk-demo-11.0.17.0.8-2.el7_9.x86_64.rpm
    java-11-openjdk-devel-11.0.17.0.8-2.el7_9.i686.rpm
    java-11-openjdk-devel-11.0.17.0.8-2.el7_9.x86_64.rpm
    java-11-openjdk-javadoc-11.0.17.0.8-2.el7_9.i686.rpm
    java-11-openjdk-javadoc-11.0.17.0.8-2.el7_9.x86_64.rpm
    java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el7_9.i686.rpm
    java-11-openjdk-javadoc-zip-11.0.17.0.8-2.el7_9.x86_64.rpm
    java-11-openjdk-jmods-11.0.17.0.8-2.el7_9.i686.rpm
    java-11-openjdk-jmods-11.0.17.0.8-2.el7_9.x86_64.rpm
    java-11-openjdk-src-11.0.17.0.8-2.el7_9.i686.rpm
    java-11-openjdk-src-11.0.17.0.8-2.el7_9.x86_64.rpm
    java-11-openjdk-static-libs-11.0.17.0.8-2.el7_9.i686.rpm
    java-11-openjdk-static-libs-11.0.17.0.8-2.el7_9.x86_64.rpm

- Scientific Linux Development Team

SciLinux: SLSA-2022-7008-1 Moderate: java-11-openjdk on SL7.x x86_64

OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618) * OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8...

Summary

Moderate: java-11-openjdk security and bug fix update



Security Fixes

* OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618)
* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
* OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE

Severity
Advisory ID: SLSA-2022:7008-1
Issued Date: : 2022-10-20
CVE Numbers: CVE-2022-21619
CVE-2022-21626
CVE-2022-21624

Related News