[CLSA-2023:1691081846] java-1.8.0-openjdk: Fix of 2 CVEs
Type:
security
Severity:
Low
Release date:
2023-08-03
Description:
- Upgrade to openjdk-shenandoah-jdk8u-shenandoah-jdk8u382-b05. That fixes following CVEs: - CVE-2023-22045: Array indexing integer overflow issue. (8304468) - CVE-2023-22049: Improper handling of slash characters in URI-to-path conversion (8305312) - Remove patch for pkcs11 cause issue was fixed in sources
Updated packages:
  • java-1.8.0-openjdk-1.8.0.382.b05-1.el6.tuxcare.els1.x86_64.rpm
    sha:2da2c051bde5ddc058c527fc714a63b378189416
  • java-1.8.0-openjdk-debug-1.8.0.382.b05-1.el6.tuxcare.els1.x86_64.rpm
    sha:453b66157a118336536127d35ef2703c76e3ed86
  • java-1.8.0-openjdk-demo-1.8.0.382.b05-1.el6.tuxcare.els1.x86_64.rpm
    sha:6092e8f702a6d7c0229cc6e8bf80356676c5b23e
  • java-1.8.0-openjdk-demo-debug-1.8.0.382.b05-1.el6.tuxcare.els1.x86_64.rpm
    sha:14626213c59e2da9f7497e1dee0acc39e8219c19
  • java-1.8.0-openjdk-devel-1.8.0.382.b05-1.el6.tuxcare.els1.x86_64.rpm
    sha:598c39b04b8dd1e93076242802bf7e91dcc748c5
  • java-1.8.0-openjdk-devel-debug-1.8.0.382.b05-1.el6.tuxcare.els1.x86_64.rpm
    sha:ba3464b328a215005bb71493649d25a90ca5cba8
  • java-1.8.0-openjdk-headless-1.8.0.382.b05-1.el6.tuxcare.els1.x86_64.rpm
    sha:868280398a75e295434e5485eae845df83e071ff
  • java-1.8.0-openjdk-headless-debug-1.8.0.382.b05-1.el6.tuxcare.els1.x86_64.rpm
    sha:15652e3e52a2c3f72311f6912edcafe7e3018400
  • java-1.8.0-openjdk-javadoc-1.8.0.382.b05-1.el6.tuxcare.els1.noarch.rpm
    sha:bfe8fbf93d605bcf482ac53be0e16501c5206d6a
  • java-1.8.0-openjdk-javadoc-debug-1.8.0.382.b05-1.el6.tuxcare.els1.noarch.rpm
    sha:fb782162fd1f444bea5cf0cd355556467e2e2fa0
  • java-1.8.0-openjdk-src-1.8.0.382.b05-1.el6.tuxcare.els1.x86_64.rpm
    sha:1bda3c6444f43710c54f4f14c74dde4d0b86fd6e
  • java-1.8.0-openjdk-src-debug-1.8.0.382.b05-1.el6.tuxcare.els1.x86_64.rpm
    sha:6acff8b0d2206c8217f48cde8f3a342a4d58829b
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.