It was discovered that the Libraries component in OpenJDK failed to properly handle ZIP archives that contain a file and directory entry with the same name within the ZIP file. This could lead to integrity issues when extracting data from such archives. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2024:0241 https://access.redhat.com/errata/RHSA-2024:0241
This issue has been addressed in the following products: Red Hat Build of OpenJDK 17.0.10 Via RHSA-2024:0246 https://access.redhat.com/errata/RHSA-2024:0246
This issue has been addressed in the following products: Red Hat Build of OpenJDK 17.0.10 Via RHSA-2024:0240 https://access.redhat.com/errata/RHSA-2024:0240
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Red Hat Enterprise Linux 8 Red Hat Enterprise Linux 9.2 Extended Update Support Red Hat Enterprise Linux 9 Via RHSA-2024:0267 https://access.redhat.com/errata/RHSA-2024:0267
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2024:0242 https://access.redhat.com/errata/RHSA-2024:0242
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2024:0244 https://access.redhat.com/errata/RHSA-2024:0244
OpenJDK-17 upstream commit: https://github.com/openjdk/jdk17u/commit/f6f32bf256e34447f54be823fdfb2e64e235e404
Oracle CPU January 2024: https://www.oracle.com/security-alerts/cpujan2024.html#AppendixJAVA Fixed in Oracle Java SE 17.0.10. Release notes: https://www.oracle.com/java/technologies/javase/17-0-10-relnotes.html