RLSA-2023:1895

Source
https://errata.rockylinux.org/RLSA-2023:1895
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2023:1895.json
JSON Data
https://api.test.osv.dev/v1/vulns/RLSA-2023:1895
Related
Published
2023-04-26T15:28:43.734178Z
Modified
2023-04-26T15:29:58.205621Z
Summary
Important: java-11-openjdk security update
Details

The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

  • OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)

  • OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)

  • OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)

  • OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)

  • OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)

  • OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)

  • OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / java-11-openjdk

Package

Name
java-11-openjdk
Purl
pkg:rpm/rocky-linux/java-11-openjdk?distro=rocky-linux-8&epoch=1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:11.0.19.0.7-1.el8_7