CVE-2023-42950 Affecting openjdk-21-openj9 package, versions <0.48.0-r2


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.11% (45th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CHAINGUARDLATEST-OPENJDK21OPENJ9-8675344
  • published30 Jan 2025
  • disclosed28 Mar 2024

Introduced: 28 Mar 2024

CVE-2023-42950  (opens in a new tab)

How to fix?

Upgrade Chainguard openjdk-21-openj9 to version 0.48.0-r2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream openjdk-21-openj9 package and not the openjdk-21-openj9 package as distributed by Chainguard. See How to fix? for Chainguard relevant fixed versions and status.

A use after free issue was addressed with improved memory management. This issue is fixed in Safari 17.2, iOS 17.2 and iPadOS 17.2, tvOS 17.2, watchOS 10.2, macOS Sonoma 14.2. Processing maliciously crafted web content may lead to arbitrary code execution.

CVSS Scores

version 3.1