First published: Wed Apr 19 2023(Updated: )
The OpenJDK 11 packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.<br>Security Fix(es):<br><li> OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)</li> <li> OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)</li> <li> OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)</li> <li> OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)</li> <li> OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)</li> <li> OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)</li> <li> OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:1883 is considered significant due to vulnerabilities in OpenJDK affecting TLS handshake and HTML parsing.
To fix RHSA-2023:1883, upgrade to the latest patched version of OpenJDK as recommended in the security advisory.
RHSA-2023:1883 addresses vulnerabilities related to improper TLS handshake handling and a Swing HTML parsing issue.
RHSA-2023:1883 affects all versions of OpenJDK that include the specified vulnerabilities.
It is not safe to continue using OpenJDK with RHSA-2023:1883 unresolved, as it may expose systems to attacks leveraging these vulnerabilities.