Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.884316
Kategorie:CentOS Local Security Checks
Titel:CentOS: Security Advisory for java-11-openjdk (CESA-2023:5736)
Zusammenfassung:The remote host is missing an update for the 'java-11-openjdk'; package(s) announced via the CESA-2023:5736 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'java-11-openjdk'
package(s) announced via the CESA-2023:5736 advisory.

Vulnerability Insight:
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

* OpenJDK: certificate path validation issue during client authentication (8309966) (CVE-2023-22081)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):

* Additional validity checks in the handling of Zip64 files, JDK-8302483, were introduced in the 11.0.20 release of OpenJDK, causing the use of some valid zip files to now fail with an error. This release, 11.0.20.1, allows for zero-length headers and additional padding produced by some Zip64 creation tools. With both releases, the checks can be disabled using -Djdk.util.zip.disableZip64ExtraFieldValidation=true. (RHBZ#2236229)

* A maximum signature file size property, jdk.jar.maxSignatureFileSize, was introduced in the 11.0.20 release of OpenJDK by JDK-8300596, with a default of 8 MB. This default proved to be too small for some JAR files. This release, 11.0.20.1, increases it to 16 MB. (RHEL-13217)

* The serviceability agent would print an exception when encountering null addresses while producing thread dumps. These null values are now handled appropriately. (JDK-8243210)

* The /usr/bin/jfr alternative is now owned by the java-11-openjdk package (RHEL-11320)

* The jcmd tool is now provided by the java-11-openjdk-headless package, rather than java-1.8.0-openjdk-devel, to make it more accessible (RHEL-13227)

Affected Software/OS:
'java-11-openjdk' package(s) on CentOS 7.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2023-22081
Oracle Advisory
https://www.oracle.com/security-alerts/cpuoct2023.html
https://lists.debian.org/debian-lts-announce/2023/10/msg00041.html
https://security.netapp.com/advisory/ntap-20231027-0006/
https://www.debian.org/security/2023/dsa-5537
https://www.debian.org/security/2023/dsa-5548
CopyrightCopyright (C) 2024 Greenbone AG

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.