{"schema_version": "1.3.1", "id": "RLSA-2022:7013", "modified": "2023-02-02T14:15:09.770828Z", "published": "2022-10-20T07:40:35Z", "related": ["CVE-2022-21618", "CVE-2022-21619", "CVE-2022-21624", "CVE-2022-21626", "CVE-2022-21628", "CVE-2022-39399"], "summary": "Moderate: java-11-openjdk security and bug fix update", "details": "The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) (CVE-2022-21618)\n\n* OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)\n\n* OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)\n\n* OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)\n\n* OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)\n\n* OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366) (CVE-2022-39399)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* Prepare for the next quarterly OpenJDK upstream release (2022-10, 11.0.17) [Rocky Linux-9] (BZ#2131865)", "severity": [{"type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}], "affected": [{"package": {"ecosystem": "Rocky Linux:9", "name": "java-11-openjdk", "purl": "pkg:rpm/rocky-linux/java-11-openjdk?distro=rocky-linux-9-0-legacy&epoch=1"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "1:11.0.17.0.8-2.el9_0"}], "database_specific": {"yum_repository": "AppStream"}}]}], "references": [{"type": "ADVISORY", "url": "https://errata.rockylinux.org/RLSA-2022:7013"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2131865"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133745"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133753"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133765"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133769"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133776"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2133817"}], "credits": [{"name": "Rocky Enterprise Software Foundation"}, {"name": "Red Hat"}]}