[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

255227

 
 

909

 
 

198741

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

RHSA-2023:4159-01 -- Redhat java-17-openjdk

ID: oval:org.secpod.oval:def:507858Date: (C)2023-07-25   (M)2024-02-19
Class: PATCHFamily: unix




The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. Security Fix: * OpenJDK: ZIP file parsing infinite loop * OpenJDK: weakness in AES implementation * OpenJDK: improper handling of slash characters in URI-to-path conversion * harfbuzz: OpenJDK: O growth via consecutive marks * OpenJDK: HTTP client insufficient file name validation * OpenJDK: modulo operator array indexing issue * OpenJDK: array indexing integer overflow issue For more details about the security issue, including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page listed in the References section. Bug Fix: * Installing the same java-17-openjdk-headless package on two different systems resulted in distinct classes.jsa files getting generated. This was because the CDS archive was being generated by a post script action of the java-17-openjdk-headless package. This prevented the use of the dynamic dump feature, as the checksum in the archive would be different on each system. This is resolved in this release by using the .jsa files generated during the initial build. * Prepare for the next quarterly OpenJDK upstream release [rhel-8]

Platform:
Red Hat Enterprise Linux 8
Product:
java-17-openjdk
Reference:
RHSA-2023:4159-01
CVE-2023-22006
CVE-2023-22036
CVE-2023-22041
CVE-2023-22044
CVE-2023-22045
CVE-2023-22049
CVE-2023-25193
CVE    7
CVE-2023-22044
CVE-2023-22041
CVE-2023-22036
CVE-2023-22006
...

© SecPod Technologies