RLSA-2023:1880

Source
https://errata.rockylinux.org/RLSA-2023:1880
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2023:1880.json
JSON Data
https://api.test.osv.dev/v1/vulns/RLSA-2023:1880
Related
Published
2023-04-26T15:28:57.893531Z
Modified
2023-04-26T15:29:58.501572Z
Summary
Important: java-11-openjdk security update
Details

The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

  • OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)

  • OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)

  • OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)

  • OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)

  • OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)

  • OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)

  • OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:9 / java-11-openjdk

Package

Name
java-11-openjdk
Purl
pkg:rpm/rocky-linux/java-11-openjdk?distro=rocky-linux-9&epoch=1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:11.0.19.0.7-1.el9_1