First published: Wed Jan 17 2024(Updated: )
The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.<br>This release of the Red Hat build of OpenJDK 8 (8u402) for Windows serves as a replacement for the Red Hat build of OpenJDK 8 (8u392) and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.<br>Security Fix(es):<br><li> OpenJDK: array out-of-bounds access due to missing range check in C1 compiler (8314468) (CVE-2024-20918)</li> <li> OpenJDK: RSA padding issue and timing side-channel attack against TLS (8317547) (CVE-2024-20952)</li> <li> OpenJDK: JVM class file verifier flaw allows unverified bytecode execution (8314295) (CVE-2024-20919)</li> <li> OpenJDK: range check loop optimization issue (8314307) (CVE-2024-20921)</li> <li> OpenJDK: arbitrary Java code execution in Nashorn (8314284) (CVE-2024-20926)</li> <li> OpenJDK: logging of digital signature private keys (8316976) (CVE-2024-20945)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK 17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:0230 is classified as critical due to significant security vulnerabilities addressed in this release.
To fix the vulnerabilities associated with RHSA-2024:0230, update your OpenJDK 8 packages to version 8u402.
Systems using the Red Hat build of OpenJDK 8 before version 8u402 are affected by RHSA-2024:0230.
Yes, RHSA-2024:0230 addresses multiple security vulnerabilities including high-impact issues reported in related Bugzilla entries.
The purpose of the RHSA-2024:0230 release is to provide security updates and bug fixes for the Red Hat build of OpenJDK 8.