First published: Thu Jul 20 2023(Updated: )
The OpenJDK 11 packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.<br>This release of the Red Hat build of OpenJDK 11 (11.0.20) for Windows serves as a replacement for the Red Hat build of OpenJDK 11 (11.0.19) and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.<br>Security Fix(es):<br><li> OpenJDK: ZIP file parsing infinite loop (8302483) (CVE-2023-22036)</li> <li> OpenJDK: weakness in AES implementation (8308682) (CVE-2023-22041)</li> <li> OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049)</li> <li> harfbuzz: OpenJDK: O(n^2) growth via consecutive marks (CVE-2023-25193)</li> <li> OpenJDK: HTTP client insufficient file name validation (8302475) (CVE-2023-22006)</li> <li> OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenJDK Java (for Middleware) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:4161 is moderate.
The affected software for RHSA-2023:4161 is Red Hat OpenJDK Java (for Middleware).
To fix RHSA-2023:4161, apply the OpenJDK 11.0.20 Security Update for Windows Builds.
Yes, you can find more information about RHSA-2023:4161 at https://access.redhat.com/errata/RHSA-2023:4161.