Bug 2075793 (CVE-2022-21443)
Summary: | CVE-2022-21443 OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Mauro Matteo Cascella <mcascell> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | ahughes, chazlett, dbhole, dfitzmau, jdowland, jhuttana, jochrist, jvanek, nengard, neugens, pjindal, security-response-team, sraghupu |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2022-04-28 23:16:07 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2073575, 2073576, 2073577, 2073578, 2073579, 2073587, 2073589, 2073590, 2073591, 2073592, 2073593, 2073594, 2073595, 2073601, 2074639, 2074641, 2074642, 2074643, 2074644, 2074645, 2074646, 2074649, 2074650, 2088330, 2092639, 2092640, 2094031 | ||
Bug Blocks: | 2073424 |
Description
Mauro Matteo Cascella
2022-04-15 11:18:01 UTC
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2022:1443 https://access.redhat.com/errata/RHSA-2022:1443 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2022:1444 https://access.redhat.com/errata/RHSA-2022:1444 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:1441 https://access.redhat.com/errata/RHSA-2022:1441 OpenJDK-17 upstream commit: https://github.com/openjdk/jdk17u/commit/47a269a11ad4a57927418e73e4458fcb2559def7 OpenJDK-11 upstream commit: https://github.com/openjdk/jdk11u/commit/c0cc90fadcab51d45090da58fd4236518bc9dd13 OpenJDK-8 upstream commit: http://hg.openjdk.java.net/jdk8u/monojdk8u/rev/ff3cd288c626 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1445 https://access.redhat.com/errata/RHSA-2022:1445 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1442 https://access.redhat.com/errata/RHSA-2022:1442 Oracle CPU April 2022: https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixJAVA Fixed in Oracle Java SE 7u341, 8u331, 11.0.15, 17.0.3, 18.0.1. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2022:1440 https://access.redhat.com/errata/RHSA-2022:1440 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2022:1487 https://access.redhat.com/errata/RHSA-2022:1487 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2022:1488 https://access.redhat.com/errata/RHSA-2022:1488 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2022:1489 https://access.redhat.com/errata/RHSA-2022:1489 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:1490 https://access.redhat.com/errata/RHSA-2022:1490 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1491 https://access.redhat.com/errata/RHSA-2022:1491 This issue has been addressed in the following products: Red Hat Build of OpenJDK 8u332 Via RHSA-2022:1492 https://access.redhat.com/errata/RHSA-2022:1492 This issue has been addressed in the following products: Red Hat Build of OpenJDK 8u332 Via RHSA-2022:1438 https://access.redhat.com/errata/RHSA-2022:1438 This issue has been addressed in the following products: Red Hat Build of OpenJDK 11.0.15 Via RHSA-2022:1435 https://access.redhat.com/errata/RHSA-2022:1435 This issue has been addressed in the following products: Red Hat Build of OpenJDK 11.0.15 Via RHSA-2022:1439 https://access.redhat.com/errata/RHSA-2022:1439 This issue has been addressed in the following products: Red Hat Build of OpenJDK 17.0.3 Via RHSA-2022:1436 https://access.redhat.com/errata/RHSA-2022:1436 This issue has been addressed in the following products: Red Hat Build of OpenJDK 17.0.3 Via RHSA-2022:1437 https://access.redhat.com/errata/RHSA-2022:1437 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-21443 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:2137 https://access.redhat.com/errata/RHSA-2022:2137 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:1729 https://access.redhat.com/errata/RHSA-2022:1729 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:1728 https://access.redhat.com/errata/RHSA-2022:1728 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Supplementary Via RHSA-2022:4957 https://access.redhat.com/errata/RHSA-2022:4957 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Supplementary Via RHSA-2022:4959 https://access.redhat.com/errata/RHSA-2022:4959 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:5837 https://access.redhat.com/errata/RHSA-2022:5837 |