-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: OpenJDK 8u382 Security Update for Portable Linux Builds Advisory ID: RHSA-2023:4209-01 Product: OpenJDK Advisory URL: https://access.redhat.com/errata/RHSA-2023:4209 Issue date: 2023-07-20 CVE Names: CVE-2023-22045 CVE-2023-22049 ===================================================================== 1. Summary: An update is now available for OpenJDK. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. This release of the Red Hat build of OpenJDK 8 (8u382) for portable Linux serves as a replacement for Red Hat build of OpenJDK 8 (8u372) and includes security and bug fixes as well as enhancements. For further information, refer to the release notes linked to in the References section. Security Fix(es): * OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) (CVE-2023-22049) * OpenJDK: array indexing integer overflow issue (8304468) (CVE-2023-22045) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 2221645 - CVE-2023-22045 OpenJDK: array indexing integer overflow issue (8304468) 2221647 - CVE-2023-22049 OpenJDK: improper handling of slash characters in URI-to-path conversion (8305312) 5. References: https://access.redhat.com/security/cve/CVE-2023-22045 https://access.redhat.com/security/cve/CVE-2023-22049 https://access.redhat.com/security/updates/classification/#moderate 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJkuTHcAAoJENzjgjWX9erEgXIQAJFZECxj9oL3NpeYArIzAqmF zkUNECAYxx3NGvjH1cIdmWX0Y2Xm8qZ52NgN6cQ0/yHKKiPi8Q+vm/beHJrhoGMh qMbFskp5vL81C8day7wcbZWj8KFtk3w7vNrsp2KK+m6nNE4dqCQOdg1ecgVYmUmV O3j7R8LqVZzQcNGpfpLd1ecIvJYAjISSQ/V0lUQshOS+weYfrNfxGRKdtOjbTAhc 5E7lRpdn+KvAVJNl7uHSF/saRD8uJiyZZ1DkYI5hLH7sWcvoRXQmiK5OqLFO2UQk ocwYHgVfOkkCNZaplqa+6J7J2zpba4n+DMYAnKtPmNNVhhaBVXcElRRQ05IG9Fbu VxDHuFOhbonyBWvz6A+siDR0YDYbSt731oVcGORIdYAePzy80r1E34YffbeZwy4o 9CqnST0rwjZcCC3wB62lIzAngbzwhVyN+hjfIS++K8tpaT0RYsSvCSZ7KX8Hqime GNMXkN65NUU2d2DtIxTifIdn2nTm2VGX/3efXzv8Z7/w14b6ANmHVQY7hZ3R0VAi Q7DL9wYCKghF+xHPCKngawGKjCb0hldQVKFQuhCCsh7ZXKG6eCWpSeq7s5DUChC9 4+fq01yz5Z6g9mRHohUxovyjW4PG9SydoLsDqaIAmLCu3OlAtLd7NN8dNsw/U7Hj 91AxhXf7MNGg+9YAD97Q =TF5g -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce