Lucene search

K
mageiaGentoo FoundationMGASA-2022-0435
HistoryNov 25, 2022 - 1:21 a.m.

Updated java packages fix security vulnerability

2022-11-2501:21:24
Gentoo Foundation
advisories.mageia.org
23
java
security
vulnerability
packages
fix
compilation
cve-2022-21540
cve-2022-21541
cve-2022-34169
xalan-j
buffer overflow
ntlm
jndi
dns
x.509
certificate parsing
httpserver
sni caching
http/2
unix

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.002 Low

EPSS

Percentile

59.6%

Class compilation issue. (CVE-2022-21540) Improper restriction of MethodHandle.invokeBasic(). (CVE-2022-21541) Integer truncation issue in Xalan-J. (CVE-2022-34169) Improper MultiByte conversion can lead to buffer overflow. (CVE-2022-21618) Improper handling of long NTLM client hostnames. (CVE-2022-21619) Insufficient randomization of JNDI DNS port numbers. (CVE-2022-21624) Excessive memory allocation in X.509 certificate parsing. (CVE-2022-21626) HttpServer no connection count limit. (CVE-2022-21628) Missing SNI caching in HTTP/2. (CVE-2022-39399)

OSVersionArchitecturePackageVersionFilename
Mageia8noarchjava< 1.8.0-openjdk-1.8.0.352.b08-1.1java-1.8.0-openjdk-1.8.0.352.b08-1.1.mga8
Mageia8noarchjava< 11-openjdk-11.0.17.0.8-1.1java-11-openjdk-11.0.17.0.8-1.1.mga8
Mageia8noarchtimezone< 2022e-1timezone-2022e-1.mga8

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.002 Low

EPSS

Percentile

59.6%