Lucene search

K
redhatRedHatRHSA-2023:1909
HistoryApr 25, 2023 - 3:55 a.m.

(RHSA-2023:1909) Important: java-1.8.0-openjdk security and bug fix update

2023-04-2503:55:44
access.redhat.com
19
openjdk
java
security
bug
update
tls handshake
cve-2023-21930
swing html parsing
cve-2023-21939
garbage collector
cve-2023-21954
certificate validation
null characters
processbuilder
uri-to-path conversion
rsapsssignature
rsa keys

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

49.9%

The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

  • OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)

  • OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)

  • OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)

  • OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)

  • OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)

  • OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)

  • OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Bug Fix(es):

  • The RSAPSSSignature implementation works with RSA keys via the SunRSASign provider. However, it did not fully check that the RSA key could be used by the provider before attempting to do so, leading to the possibility of errors being returned with custom security providers. The implementation now validates RSA keys and will allow other providers to handle such keys where it cannot. (RHBZ#2188024)

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

EPSS

0.001

Percentile

49.9%