RLSA-2023:1909

Source
https://errata.rockylinux.org/RLSA-2023:1909
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2023:1909.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2023:1909
Related
Published
2023-04-26T15:28:57.893531Z
Modified
2023-04-26T15:29:58.605307Z
Summary
Important: java-1.8.0-openjdk security and bug fix update
Details

The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

  • OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)

  • OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)

  • OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)

  • OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)

  • OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)

  • OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)

  • OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • The RSAPSSSignature implementation works with RSA keys via the SunRSASign provider. However, it did not fully check that the RSA key could be used by the provider before attempting to do so, leading to the possibility of errors being returned with custom security providers. The implementation now validates RSA keys and will allow other providers to handle such keys where it cannot. (RHBZ#2188024)
References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:9 / java-1.8.0-openjdk

Package

Name
java-1.8.0-openjdk
Purl
pkg:rpm/rocky-linux/java-1.8.0-openjdk?distro=rocky-linux-9&epoch=1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:1.8.0.372.b07-1.el9_1