Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2023:1911 - Security Advisory
Issued:
2023-04-25
Updated:
2023-04-25

RHSA-2023:1911 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: java-1.8.0-openjdk security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

  • OpenJDK: improper connection handling during TLS handshake (8294474) (CVE-2023-21930)
  • OpenJDK: Swing HTML parsing issue (8296832) (CVE-2023-21939)
  • OpenJDK: incorrect enqueue of references in garbage collector (8298191) (CVE-2023-21954)
  • OpenJDK: certificate validation issue in TLS session negotiation (8298310) (CVE-2023-21967)
  • OpenJDK: missing string checks for NULL characters (8296622) (CVE-2023-21937)
  • OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304) (CVE-2023-21938)
  • OpenJDK: missing check for slash characters in URI-to-path conversion (8298667) (CVE-2023-21968)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

All running instances of OpenJDK Java must be restarted for this update to take effect.

Affected Products

  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1 x86_64

Fixes

  • BZ - 2187435 - CVE-2023-21930 OpenJDK: improper connection handling during TLS handshake (8294474)
  • BZ - 2187441 - CVE-2023-21954 OpenJDK: incorrect enqueue of references in garbage collector (8298191)
  • BZ - 2187704 - CVE-2023-21967 OpenJDK: certificate validation issue in TLS session negotiation (8298310)
  • BZ - 2187724 - CVE-2023-21939 OpenJDK: Swing HTML parsing issue (8296832)
  • BZ - 2187758 - CVE-2023-21938 OpenJDK: incorrect handling of NULL characters in ProcessBuilder (8295304)
  • BZ - 2187790 - CVE-2023-21937 OpenJDK: missing string checks for NULL characters (8296622)
  • BZ - 2187802 - CVE-2023-21968 OpenJDK: missing check for slash characters in URI-to-path conversion (8298667)

CVEs

  • CVE-2023-21930
  • CVE-2023-21937
  • CVE-2023-21938
  • CVE-2023-21939
  • CVE-2023-21954
  • CVE-2023-21967
  • CVE-2023-21968

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.1

SRPM
java-1.8.0-openjdk-1.8.0.372.b07-1.el8_1.src.rpm SHA-256: fd39358aa71795065153e9adc42e72cd4134b2bfd58e40a73396d15c29ec025d
ppc64le
java-1.8.0-openjdk-1.8.0.372.b07-1.el8_1.ppc64le.rpm SHA-256: d16eb66f3178307d923cff77a60970f8e5a0077b74bd578e5ae45b7b0a29edce
java-1.8.0-openjdk-accessibility-1.8.0.372.b07-1.el8_1.ppc64le.rpm SHA-256: fefae62d65286d437f147f3fd6b9aac18451649a4544d3fb580dfec03b2968ec
java-1.8.0-openjdk-debuginfo-1.8.0.372.b07-1.el8_1.ppc64le.rpm SHA-256: ff70506e4f4f361de12250a18f6d0e504208148f164bdd1ea20442e7eea894b7
java-1.8.0-openjdk-debugsource-1.8.0.372.b07-1.el8_1.ppc64le.rpm SHA-256: ba0a7541aadddb9c63c9e9e2f88ceaae85fb463b9da74bb7b3f8429b26e5f573
java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el8_1.ppc64le.rpm SHA-256: 2fdfb975721f6c382d07b19d06b27cb8f38a684a4bcffb8d3cd89ee8bdcda828
java-1.8.0-openjdk-demo-debuginfo-1.8.0.372.b07-1.el8_1.ppc64le.rpm SHA-256: 01f2adf5d7e686aa4b0bf606dd79f0ff1001d9180fe70ab973a318be73aa50dd
java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.372.b07-1.el8_1.ppc64le.rpm SHA-256: 239ea30f1f1ba49b3f7a28b8acdc0c516bfef7fed61ac56915c49229eedad093
java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el8_1.ppc64le.rpm SHA-256: 9e317532c9f3e95e73fe8a06f97f466267a3aaffc7bb639e6ab907f966fd8889
java-1.8.0-openjdk-devel-debuginfo-1.8.0.372.b07-1.el8_1.ppc64le.rpm SHA-256: 4651dd55cfe0ed8d9b4cd2bb16618f9413af852cc002aee23d0e77555f3c2493
java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.372.b07-1.el8_1.ppc64le.rpm SHA-256: 528ee6189296ce75672a343e31b103be2e4960f5788f617f9e42585c31a2e283
java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el8_1.ppc64le.rpm SHA-256: 551df720f9cac2858234cf9a88017bc8c781d3a2b48f20bda3ab6e2e2fccac64
java-1.8.0-openjdk-headless-debuginfo-1.8.0.372.b07-1.el8_1.ppc64le.rpm SHA-256: 53fed0df0a7a659a4d2963cd58ee42aadaa4d93edef20135039d8aef6e728abc
java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.372.b07-1.el8_1.ppc64le.rpm SHA-256: a56d82b650e0b01173f9af12b0f217c5cbfe14a2a6ff4861ffa2a2bf4e9d1920
java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el8_1.noarch.rpm SHA-256: 69583ee743714db09c37166f53f06507512ecb9762817a19a0f57a8a866c900c
java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el8_1.noarch.rpm SHA-256: 40ceb0848f37d224f061675356e89d5c08b696b2054737a6b1cc749849f3af06
java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.372.b07-1.el8_1.ppc64le.rpm SHA-256: 2cb624c76dad70aef031036b1553bf2a3891ce353cb2559c87c742e8598eb76d
java-1.8.0-openjdk-src-1.8.0.372.b07-1.el8_1.ppc64le.rpm SHA-256: 845f1d4c73e291eda08de1439e71ed6cbf59ca07567be653dae563dd9f396356

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.1

SRPM
java-1.8.0-openjdk-1.8.0.372.b07-1.el8_1.src.rpm SHA-256: fd39358aa71795065153e9adc42e72cd4134b2bfd58e40a73396d15c29ec025d
x86_64
java-1.8.0-openjdk-1.8.0.372.b07-1.el8_1.x86_64.rpm SHA-256: e5ad59612cd2b74f4aef5d4f1699673c4d3041e6507db818f150842dc27e59d2
java-1.8.0-openjdk-accessibility-1.8.0.372.b07-1.el8_1.x86_64.rpm SHA-256: 5733728728fb6d4c400cff0de6d69178e2916ee5371166842498eac2588bc65f
java-1.8.0-openjdk-debuginfo-1.8.0.372.b07-1.el8_1.x86_64.rpm SHA-256: e10a0f3c26619ac4a66a80b27458502a1c15b533035e1e5ca2cd3f3b6cc84dae
java-1.8.0-openjdk-debugsource-1.8.0.372.b07-1.el8_1.x86_64.rpm SHA-256: 0ec9a3e11ecc72873a23ffe2df03125ef7ee40ae2d469a20c7b675c96214e0be
java-1.8.0-openjdk-demo-1.8.0.372.b07-1.el8_1.x86_64.rpm SHA-256: a497070762ca5cb519d3a70fd56534d55f4828044c1772fd3608b48ec1728f5c
java-1.8.0-openjdk-demo-debuginfo-1.8.0.372.b07-1.el8_1.x86_64.rpm SHA-256: 01ba7b515347c5dcc3397ece4fd4bb16ec47d9efcfc1f9b09c482bfbcb47bcb7
java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.372.b07-1.el8_1.x86_64.rpm SHA-256: 0c75408e52a6db56a61b01d41ab4f5bd7ee116433a964c3570feb57089066437
java-1.8.0-openjdk-devel-1.8.0.372.b07-1.el8_1.x86_64.rpm SHA-256: 5355e888bc4d3f04eeeef0e74ba5a212d61b925259442b7d41983ffa56d96821
java-1.8.0-openjdk-devel-debuginfo-1.8.0.372.b07-1.el8_1.x86_64.rpm SHA-256: 96aaebc509f5145d427e33c9c6e077f60218fe974cf06b64c0935182249107fa
java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.372.b07-1.el8_1.x86_64.rpm SHA-256: e6d3723b8650b5ac370a42ce6d247694a9dd46f8db93ba758e8b8e50beb327e4
java-1.8.0-openjdk-headless-1.8.0.372.b07-1.el8_1.x86_64.rpm SHA-256: b767689f1a754415fc7a9288a99fa0b90cf72efb49af7fce2031b9f1c98b34bd
java-1.8.0-openjdk-headless-debuginfo-1.8.0.372.b07-1.el8_1.x86_64.rpm SHA-256: fea7cd31b977801347dc7269fa60e68f8f33fd8663f80fa1f807efd4bae01291
java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.372.b07-1.el8_1.x86_64.rpm SHA-256: f2bbdec89d01cbe1a2863000cd2e86ccda3ab5c87ef2c6bbcc67722f6d8c2bcb
java-1.8.0-openjdk-javadoc-1.8.0.372.b07-1.el8_1.noarch.rpm SHA-256: 69583ee743714db09c37166f53f06507512ecb9762817a19a0f57a8a866c900c
java-1.8.0-openjdk-javadoc-zip-1.8.0.372.b07-1.el8_1.noarch.rpm SHA-256: 40ceb0848f37d224f061675356e89d5c08b696b2054737a6b1cc749849f3af06
java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.372.b07-1.el8_1.x86_64.rpm SHA-256: 78f71a1cc332575d4d2021c1ef6d180145b069abd8676d59f538768d2a4217a5
java-1.8.0-openjdk-src-1.8.0.372.b07-1.el8_1.x86_64.rpm SHA-256: 3ea62bf8d4eaed277d281517267c4e6cf98933e888371689846654a5cc841726

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility