First published: Tue Apr 18 2023(Updated: )
An HTML validation flaw was found in the Swing component of OpenJDK. A specially crafted HTML document could cause a Swing Java application to misbehave leading to integrity problems.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openjdk-11 | <=11.0.16+8-1~deb10u1 | 11.0.21+9-1~deb10u1 11.0.20+8-1~deb11u1 11.0.21+9-1~deb11u1 11.0.22~6ea-1 |
debian/openjdk-17 | 17.0.7+7-1~deb11u1 17.0.9+9-1~deb11u1 17.0.9+9-1~deb12u1 17.0.10~6ea-1 | |
debian/openjdk-20 | 20.0.2+9-1 | |
debian/openjdk-8 | 8u392-ga-1 | |
IBM Cognos Controller | <=11.0.0 - 11.0.1 | |
Oracle GraalVM Enterprise Edition | =20.3.9 | |
Oracle GraalVM Enterprise Edition | =21.3.5 | |
Oracle GraalVM Enterprise Edition | =22.3.1 | |
Oracle JDK 6 | =1.8.0-update361 | |
Oracle JDK 6 | =11.0.18 | |
Oracle JDK 6 | =17.0.6 | |
Oracle JDK 6 | =20 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update361 | |
Oracle Java Runtime Environment (JRE) | =11.0.18 | |
Oracle Java Runtime Environment (JRE) | =17.0.6 | |
Oracle Java Runtime Environment (JRE) | =20 | |
NetApp 7-Mode Transition Tool | ||
Brocade SANnav | ||
netapp cloud insights acquisition unit | ||
NetApp Cloud Insights Storage Workload Security Agent | ||
NetApp OnCommand Insight | ||
Debian | =10.0 | |
Debian | =11.0 | |
Debian | =12.0 | |
OpenJDK 17 | <8 | |
OpenJDK 17 | >=11<=11.0.18 | |
OpenJDK 17 | >=17<=17.0.6 | |
OpenJDK 17 | =8 | |
OpenJDK 17 | =8-milestone1 | |
OpenJDK 17 | =8-milestone2 | |
OpenJDK 17 | =8-milestone3 | |
OpenJDK 17 | =8-milestone4 | |
OpenJDK 17 | =8-milestone5 | |
OpenJDK 17 | =8-milestone6 | |
OpenJDK 17 | =8-milestone7 | |
OpenJDK 17 | =8-milestone8 | |
OpenJDK 17 | =8-milestone9 | |
OpenJDK 17 | =8-update101 | |
OpenJDK 17 | =8-update102 | |
OpenJDK 17 | =8-update11 | |
OpenJDK 17 | =8-update111 | |
OpenJDK 17 | =8-update112 | |
OpenJDK 17 | =8-update121 | |
OpenJDK 17 | =8-update131 | |
OpenJDK 17 | =8-update141 | |
OpenJDK 17 | =8-update151 | |
OpenJDK 17 | =8-update152 | |
OpenJDK 17 | =8-update161 | |
OpenJDK 17 | =8-update162 | |
OpenJDK 17 | =8-update171 | |
OpenJDK 17 | =8-update172 | |
OpenJDK 17 | =8-update181 | |
OpenJDK 17 | =8-update191 | |
OpenJDK 17 | =8-update192 | |
OpenJDK 17 | =8-update20 | |
OpenJDK 17 | =8-update201 | |
OpenJDK 17 | =8-update202 | |
OpenJDK 17 | =8-update211 | |
OpenJDK 17 | =8-update212 | |
OpenJDK 17 | =8-update221 | |
OpenJDK 17 | =8-update222 | |
OpenJDK 17 | =8-update231 | |
OpenJDK 17 | =8-update232 | |
OpenJDK 17 | =8-update241 | |
OpenJDK 17 | =8-update242 | |
OpenJDK 17 | =8-update25 | |
OpenJDK 17 | =8-update252 | |
OpenJDK 17 | =8-update262 | |
OpenJDK 17 | =8-update271 | |
OpenJDK 17 | =8-update281 | |
OpenJDK 17 | =8-update282 | |
OpenJDK 17 | =8-update291 | |
OpenJDK 17 | =8-update301 | |
OpenJDK 17 | =8-update302 | |
OpenJDK 17 | =8-update31 | |
OpenJDK 17 | =8-update312 | |
OpenJDK 17 | =8-update322 | |
OpenJDK 17 | =8-update332 | |
OpenJDK 17 | =8-update342 | |
OpenJDK 17 | =8-update352 | |
OpenJDK 17 | =8-update362 | |
OpenJDK 17 | =8-update40 | |
OpenJDK 17 | =8-update45 | |
OpenJDK 17 | =8-update5 | |
OpenJDK 17 | =8-update51 | |
OpenJDK 17 | =8-update60 | |
OpenJDK 17 | =8-update65 | |
OpenJDK 17 | =8-update66 | |
OpenJDK 17 | =8-update71 | |
OpenJDK 17 | =8-update72 | |
OpenJDK 17 | =8-update73 | |
OpenJDK 17 | =8-update74 | |
OpenJDK 17 | =8-update77 | |
OpenJDK 17 | =8-update91 | |
OpenJDK 17 | =8-update92 | |
OpenJDK 17 | =20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-21939.
The affected software includes Oracle Java SE versions 8u361, 8u361-perf, 11.0.18, 17.0.6, and 20; Oracle GraalVM Enterprise Edition versions 20.3.9, 21.3.5, and 22.3.1.
The severity of CVE-2023-21939 is medium with a CVSS score of 5.3.
To fix the vulnerability, update to the latest versions of Oracle Java SE or Oracle GraalVM Enterprise Edition as mentioned in the references.
You can find more information about CVE-2023-21939 in the references provided.