-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: OpenJDK 8u362 Windows Security Update
Advisory ID:       RHSA-2023:0354-01
Product:           OpenJDK
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:0354
Issue date:        2023-01-23
CVE Names:         CVE-2023-21830 CVE-2023-21843 
====================================================================
1. Summary:

The Red Hat build of OpenJDK 8 (java-1.8.0-openjdk) is now available for
Windows.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and
the OpenJDK 8 Java Software Development Kit.

This release of the Red Hat build of OpenJDK 8 (8u362) for Windows serves
as a replacement for the Red Hat build of OpenJDK 8 (8u352) and includes
security and bug fixes, and enhancements. For further information, refer to
the release notes linked to in the References section.

Security Fix(es):

* OpenJDK: improper restrictions in CORBA deserialization (CVE-2023-21830)

* OpenJDK: soundbank URL remote loading (CVE-2023-21843)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgements, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_windows/index

4. Bugs fixed (https://bugzilla.redhat.com/):

2160475 - CVE-2023-21843 OpenJDK: soundbank URL remote loading (Sound, 8293742)
2160490 - CVE-2023-21830 OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021)

5. References:

https://access.redhat.com/security/cve/CVE-2023-21830
https://access.redhat.com/security/cve/CVE-2023-21843
https://access.redhat.com/security/updates/classification/#moderate

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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jQFY
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2023-0354:01 Moderate: OpenJDK 8u362 Windows Security Update

The Red Hat build of OpenJDK 8 (java-1.8.0-openjdk) is now available for Windows

Summary

The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
This release of the Red Hat build of OpenJDK 8 (8u362) for Windows serves as a replacement for the Red Hat build of OpenJDK 8 (8u352) and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.
Security Fix(es):
* OpenJDK: improper restrictions in CORBA deserialization (CVE-2023-21830)
* OpenJDK: soundbank URL remote loading (CVE-2023-21843)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_windows/index

References

https://access.redhat.com/security/cve/CVE-2023-21830 https://access.redhat.com/security/cve/CVE-2023-21843 https://access.redhat.com/security/updates/classification/#moderate

Package List


Severity
Advisory ID: RHSA-2023:0354-01
Product: OpenJDK
Advisory URL: https://access.redhat.com/errata/RHSA-2023:0354
Issued Date: : 2023-01-23
CVE Names: CVE-2023-21830 CVE-2023-21843

Topic

The Red Hat build of OpenJDK 8 (java-1.8.0-openjdk) is now available forWindows.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures


Bugs Fixed

2160475 - CVE-2023-21843 OpenJDK: soundbank URL remote loading (Sound, 8293742)

2160490 - CVE-2023-21830 OpenJDK: improper restrictions in CORBA deserialization (Serialization, 8285021)


Related News