{"schema_version": "1.3.1", "id": "RLSA-2023:1909", "modified": "2023-04-26T15:29:58.605307Z", "published": "2023-04-26T15:28:57.893531Z", "related": ["CVE-2023-21930", "CVE-2023-21937", "CVE-2023-21938", "CVE-2023-21939", "CVE-2023-21954", "CVE-2023-21967", "CVE-2023-21968"], "summary": "Important: java-1.8.0-openjdk security and bug fix update", "details": "The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.\n\nSecurity Fix(es):\n\n* OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)\n\n* OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)\n\n* OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)\n\n* OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)\n\n* OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)\n\n* OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)\n\n* OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nBug Fix(es):\n\n* The RSAPSSSignature implementation works with RSA keys via the SunRSASign provider. However, it did not fully check that the RSA key could be used by the provider before attempting to do so, leading to the possibility of errors being returned with custom security providers. The implementation now validates RSA keys and will allow other providers to handle such keys where it cannot. (RHBZ#2188024)", "affected": [{"package": {"ecosystem": "Rocky Linux:9", "name": "java-1.8.0-openjdk", "purl": "pkg:rpm/rocky-linux/java-1.8.0-openjdk?distro=rocky-linux-9&epoch=1"}, "ranges": [{"type": "ECOSYSTEM", "events": [{"introduced": "0"}, {"fixed": "1:1.8.0.372.b07-1.el9_1"}], "database_specific": {"yum_repository": "CRB"}}]}], "references": [{"type": "ADVISORY", "url": "https://errata.rockylinux.org/RLSA-2023:1909"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187435"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187441"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187704"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187724"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187758"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187790"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187802"}, {"type": "REPORT", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2188024"}], "credits": [{"name": "Rocky Enterprise Software Foundation"}, {"name": "Red Hat"}]}