First published: Wed Oct 18 2023(Updated: )
Moderate: java-11-openjdk security and bug fix update
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Red Hat Enterprise Linux Desktop | ||
Red Hat Red Hat Enterprise Linux for Power, little endian | ||
Red Hat Red Hat Enterprise Linux Workstation | ||
Red Hat Red Hat Enterprise Linux for Power, big endian | ||
Red Hat Red Hat Enterprise Linux for Scientific Computing | ||
Red Hat Red Hat Enterprise Linux Server | ||
Red Hat Red Hat Enterprise Linux for IBM z Systems | ||
redhat/java | <11-openjdk-11.0.21.0.9-1.el7_9 | 11-openjdk-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-11.0.21.0.9-1.el7_9 | 11-openjdk-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-debuginfo-11.0.21.0.9-1.el7_9 | 11-openjdk-debuginfo-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-debuginfo-11.0.21.0.9-1.el7_9 | 11-openjdk-debuginfo-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-demo-11.0.21.0.9-1.el7_9 | 11-openjdk-demo-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-demo-11.0.21.0.9-1.el7_9 | 11-openjdk-demo-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-devel-11.0.21.0.9-1.el7_9 | 11-openjdk-devel-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-devel-11.0.21.0.9-1.el7_9 | 11-openjdk-devel-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-headless-11.0.21.0.9-1.el7_9 | 11-openjdk-headless-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-headless-11.0.21.0.9-1.el7_9 | 11-openjdk-headless-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-javadoc-11.0.21.0.9-1.el7_9 | 11-openjdk-javadoc-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-javadoc-11.0.21.0.9-1.el7_9 | 11-openjdk-javadoc-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-javadoc-zip-11.0.21.0.9-1.el7_9 | 11-openjdk-javadoc-zip-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-javadoc-zip-11.0.21.0.9-1.el7_9 | 11-openjdk-javadoc-zip-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-jmods-11.0.21.0.9-1.el7_9 | 11-openjdk-jmods-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-jmods-11.0.21.0.9-1.el7_9 | 11-openjdk-jmods-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-src-11.0.21.0.9-1.el7_9 | 11-openjdk-src-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-src-11.0.21.0.9-1.el7_9 | 11-openjdk-src-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-static-libs-11.0.21.0.9-1.el7_9 | 11-openjdk-static-libs-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-static-libs-11.0.21.0.9-1.el7_9 | 11-openjdk-static-libs-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-11.0.21.0.9-1.el7_9 | 11-openjdk-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-debuginfo-11.0.21.0.9-1.el7_9 | 11-openjdk-debuginfo-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-demo-11.0.21.0.9-1.el7_9 | 11-openjdk-demo-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-devel-11.0.21.0.9-1.el7_9 | 11-openjdk-devel-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-headless-11.0.21.0.9-1.el7_9 | 11-openjdk-headless-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-javadoc-11.0.21.0.9-1.el7_9 | 11-openjdk-javadoc-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-javadoc-zip-11.0.21.0.9-1.el7_9 | 11-openjdk-javadoc-zip-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-jmods-11.0.21.0.9-1.el7_9 | 11-openjdk-jmods-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-src-11.0.21.0.9-1.el7_9 | 11-openjdk-src-11.0.21.0.9-1.el7_9 |
redhat/java | <11-openjdk-static-libs-11.0.21.0.9-1.el7_9 | 11-openjdk-static-libs-11.0.21.0.9-1.el7_9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2023:5736 is medium.
To fix the vulnerability, you should apply the recommended security and bug fix update for java-11-openjdk.
The vulnerability affects java-11-openjdk on Red Hat Enterprise Linux Desktop, Red Hat Enterprise Linux Workstation, Red Hat Enterprise Linux Server, Red Hat Enterprise Linux for Scientific Computing, Red Hat Enterprise Linux for Power (little endian and big endian), and Red Hat Enterprise Linux for IBM z Systems.
The recommended remedy is to upgrade to java-11-openjdk-11.0.21.0.9-1.el7_9 or a higher version.
You can find more information about RHSA-2023:5736 in the Red Hat Security Advisory at https://access.redhat.com/errata/RHSA-2023:5736.