Amazon Linux 2 Security Advisory: ALASCORRETTO8-2022-004
Advisory Release Date: 2022-10-17 22:06 Pacific
Advisory Updated Date: 2023-05-11 16:24 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
2023-05-11: CVE-2022-21618 and CVE-2022-39399 have changed status to NOT AFFECTED for this package and have been removed from this advisory.
Title: Improve NTLM support
writeSecurityBuffer() writes a serialized security buffer to be used for NTLM
auth. One of the fields that are serialized is a hostname provided by the
name resolver. If this hostname is very long, integer truncation occurs,
which would allow a malicious hostname to be partially re-interpreted as
something else following a hostname, once the security buffer is deserialized
on the other size. (CVE-2022-21619)
Title: Improve JNDI lookups
JNDI DNS port numbers can be easily guessed and should be more random. (CVE-2022-21624)
Title: Key X509 usages
Decoding of X509 keys may use excessive amount of heap memory. (CVE-2022-21626)
Title: Better HttpServer service
HttpServer eagerly accepts connections which may exceed the limit. (CVE-2022-21628)
Affected Packages:
java-1.8.0-amazon-corretto
Note:
This advisory is applicable to Amazon Linux 2 - Corretto8 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update java-1.8.0-amazon-corretto to update your system.
aarch64:
java-1.8.0-amazon-corretto-1.8.0_352.b08-1.amzn2.aarch64
java-1.8.0-amazon-corretto-devel-1.8.0_352.b08-1.amzn2.aarch64
src:
java-1.8.0-amazon-corretto-1.8.0_352.b08-1.amzn2.src
x86_64:
java-1.8.0-amazon-corretto-1.8.0_352.b08-1.amzn2.x86_64
java-1.8.0-amazon-corretto-devel-1.8.0_352.b08-1.amzn2.x86_64