CVE-2023-22041

Summary

CVECVE-2023-22041
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2023-07-18 21:15:00 UTC
Updated2024-01-26 16:48:00 UTC
DescriptionVulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK product of Oracle Java SE (component: Hotspot). Supported versions that are affected are Oracle Java SE: 8u371-perf, 11.0.19, 17.0.7, 20.0.1; Oracle GraalVM Enterprise Edition: 20.3.10, 21.3.6, 22.3.2; Oracle GraalVM for JDK: 17.0.7 and 20.0.1. Difficult to exploit vulnerability allows unauthenticated attacker with logon to the infrastructure where Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK executes to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.1 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N).

Risk And Classification

Problem Types: NVD-CWE-noinfo

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Operating System Debian Debian Linux 10.0 All All All
Operating System Debian Debian Linux 11.0 All All All
Operating System Debian Debian Linux 12.0 All All All
Application Netapp 7-mode Transition Tool - All All All
Application Netapp Active Iq Unified Manager - All All All
Application Netapp Active Iq Unified Manager - All All All
Application Netapp Cloud Insights Acquisition Unit - All All All
Application Netapp Cloud Insights Storage Workload Security Agent - All All All
Application Netapp Oncommand Insight - All All All
Application Oracle Graalvm 20.3.10 All All All
Application Oracle Graalvm 21.3.6 All All All
Application Oracle Graalvm 22.3.2 All All All
Application Oracle Graalvm For Jdk 17.0.7 All All All
Application Oracle Graalvm For Jdk 20.0.1 All All All
Application Oracle Jdk 1.8.0 update371 All All
Application Oracle Jdk 11.0.19 All All All
Application Oracle Jdk 17.0.7 All All All
Application Oracle Jdk 20.0.1 All All All
Application Oracle Jre 1.8.0 update371 All All
Application Oracle Jre 11.0.19 All All All
Application Oracle Jre 17.0.7 All All All
Application Oracle Jre 20.0.1 All All All

References

ReferenceSourceLinkTags
Oracle Critical Patch Update Advisory - July 2023 MISC www.oracle.com
July 2023 Java Platform Standard Edition Vulnerabilities in NetApp Products | NetApp Product Security MISC security.netapp.com
Debian -- Security Information -- DSA-5458-1 openjdk-17 MISC www.debian.org
[SECURITY] [DLA 3571-1] openjdk-11 security update MISC lists.debian.org
Debian -- Security Information -- DSA-5478-1 openjdk-11 MISC www.debian.org
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 160804 Oracle Enterprise Linux Security Update for java-11-openjdk (ELSA-2023-4233)
  • 160809 Oracle Enterprise Linux Security Update for java-17-openjdk (ELSA-2023-4159)
  • 160812 Oracle Enterprise Linux Security Update for java-11-openjdk (ELSA-2023-4158)
  • 160815 Oracle Enterprise Linux Security Update for java-11-openjdk (ELSA-2023-4175)
  • 160816 Oracle Enterprise Linux Security Update for java-17-openjdk (ELSA-2023-4177)
  • 199629 Ubuntu Security Notification for Open Java Development Toolkit (OpenJDK) Vulnerabilities (USN-6263-1)
  • 199638 Ubuntu Security Notification for Open Java Development Toolkit (OpenJDK) 20 Vulnerabilities (USN-6272-1)
  • 241837 Red Hat Update for java-17-openjdk (RHSA-2023:4170)
  • 241838 Red Hat Update for java-11-openjdk (RHSA-2023:4162)
  • 241840 Red Hat Update for java-11-openjdk (RHSA-2023:4165)
  • 241841 Red Hat Update for java-11-openjdk (RHSA-2023:4163)
  • 241842 Red Hat Update for java-17-openjdk (RHSA-2023:4169)
  • 241846 Red Hat Update for java-11-openjdk (RHSA-2023:4164)
  • 241847 Red Hat Update for java-17-openjdk (RHSA-2023:4171)
  • 241849 Red Hat Update for java-11-openjdk (RHSA-2023:4157)
  • 241851 Red Hat Update for java-11-openjdk (RHSA-2023:4175)
  • 241854 Red Hat Update for java-17-openjdk (RHSA-2023:4177)
  • 241855 Red Hat Update for java-11-openjdk (RHSA-2023:4158)
  • 241859 Red Hat Update for java-11-openjdk (RHSA-2023:4233)
  • 241860 Red Hat Update for java-17-openjdk (RHSA-2023:4159)
  • 257249 CentOS Security Update for java-11-openjdk
  • 355631 Amazon Linux Security Advisory for java-17-amazon-corretto : ALAS2023-2023-258
  • 355636 Amazon Linux Security Advisory for java-11-amazon-corretto : ALAS2023-2023-257
  • 355651 Amazon Linux Security Advisory for java-11-amazon-corretto : ALAS2-2023-2137
  • 355652 Amazon Linux Security Advisory for java-17-amazon-corretto : ALAS2-2023-2138
  • 355794 Amazon Linux Security Advisory for java-11-openjdk : ALAS2JAVA-OPENJDK11-2023-005
  • 378673 Oracle Java Standard Edition (SE) Critical Patch Update - July 2023 (CPUJUL2023)
  • 378691 Amazon Corretto Critical Patch Update (JUL2023)
  • 378692 Azul Java Multiple Vulnerabilities Security Update July 2023
  • 378761 Alibaba Cloud Linux Security Update for java-11-openjdk (ALINUX2-SA-2023:0035)
  • 378792 Red Hat OpenJDK 11.0.20 Security Update for Windows Builds (RHSA-2023:4161)
  • 378793 Red Hat OpenJDK 17.0.8 Security Update for Windows Builds (RHSA-2023:4211)
  • 378921 Alibaba Cloud Linux Security Update for java-17-openjdk (ALINUX3-SA-2023:0119)
  • 378923 Alibaba Cloud Linux Security Update for java-11-openjdk (ALINUX3-SA-2023:0118)
  • 503425 Alpine Linux Security Update for openjdk11
  • 503427 Alpine Linux Security Update for openjdk17
  • 506135 Alpine Linux Security Update for openjdk11
  • 506137 Alpine Linux Security Update for openjdk17
  • 6000156 Debian Security Update for openjdk-11 (DLA 3571-1)
  • 6000168 Debian Security Update for openjdk-17 (DSA 5458-1)
  • 6000244 Debian Security Update for openjdk-11 (DSA 5478-1)
  • 754217 SUSE Enterprise Linux Security Update for java-11-openjdk (SUSE-SU-2023:2990-1)
  • 754271 SUSE Enterprise Linux Security Update for java-11-openjdk (SUSE-SU-2023:3287-1)
  • 941188 AlmaLinux Security Update for java-11-openjdk (ALSA-2023:4175)
  • 941189 AlmaLinux Security Update for java-17-openjdk (ALSA-2023:4159)
  • 941191 AlmaLinux Security Update for java-17-openjdk (ALSA-2023:4177)
  • 941192 AlmaLinux Security Update for java-11-openjdk (ALSA-2023:4158)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report