Bug 2075849 (CVE-2022-21496)
| Summary: | CVE-2022-21496 OpenJDK: URI parsing inconsistencies (JNDI, 8278972) | ||
|---|---|---|---|
| Product: | [Other] Security Response | Reporter: | Mauro Matteo Cascella <mcascell> |
| Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
| Status: | CLOSED ERRATA | QA Contact: | |
| Severity: | medium | Docs Contact: | |
| Priority: | medium | ||
| Version: | unspecified | CC: | ahughes, chazlett, dbhole, dfitzmau, jdowland, jhuttana, jochrist, jvanek, nengard, neugens, pjindal, security-response-team, sraghupu |
| Target Milestone: | --- | Keywords: | Security |
| Target Release: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2022-04-29 00:16:09 UTC | Type: | --- |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2073575, 2073576, 2073577, 2073578, 2073579, 2073587, 2073589, 2073590, 2073591, 2073592, 2073593, 2073594, 2073595, 2073601, 2074639, 2074641, 2074642, 2074643, 2074644, 2074645, 2074646, 2074649, 2074650, 2088330, 2092639, 2092640, 2094031 | ||
| Bug Blocks: | 2073424 | ||
|
Description
Mauro Matteo Cascella
2022-04-15 17:06:29 UTC
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2022:1443 https://access.redhat.com/errata/RHSA-2022:1443 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2022:1444 https://access.redhat.com/errata/RHSA-2022:1444 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:1441 https://access.redhat.com/errata/RHSA-2022:1441 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1445 https://access.redhat.com/errata/RHSA-2022:1445 OpenJDK-17 upstream commit: https://github.com/openjdk/jdk17u/commit/a61b441176f86a8eb3125e997f4c827fe920bec4 OpenJDK-11 upstream commit: https://github.com/openjdk/jdk11u/commit/666f21fe139873e877a3b2e05e46437b96e552e7 OpenJDK-8 upstream commit: http://hg.openjdk.java.net/jdk8u/monojdk8u/rev/a29e720c80d4 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1442 https://access.redhat.com/errata/RHSA-2022:1442 Oracle CPU April 2022: https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixJAVA Fixed in Oracle Java SE 7u341, 8u331, 11.0.15, 17.0.3, 18.0.1. This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2022:1440 https://access.redhat.com/errata/RHSA-2022:1440 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2022:1487 https://access.redhat.com/errata/RHSA-2022:1487 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2022:1488 https://access.redhat.com/errata/RHSA-2022:1488 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2022:1489 https://access.redhat.com/errata/RHSA-2022:1489 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:1490 https://access.redhat.com/errata/RHSA-2022:1490 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1491 https://access.redhat.com/errata/RHSA-2022:1491 This issue has been addressed in the following products: Red Hat Build of OpenJDK 8u332 Via RHSA-2022:1492 https://access.redhat.com/errata/RHSA-2022:1492 This issue has been addressed in the following products: Red Hat Build of OpenJDK 8u332 Via RHSA-2022:1438 https://access.redhat.com/errata/RHSA-2022:1438 This issue has been addressed in the following products: Red Hat Build of OpenJDK 11.0.15 Via RHSA-2022:1435 https://access.redhat.com/errata/RHSA-2022:1435 This issue has been addressed in the following products: Red Hat Build of OpenJDK 11.0.15 Via RHSA-2022:1439 https://access.redhat.com/errata/RHSA-2022:1439 This issue has been addressed in the following products: Red Hat Build of OpenJDK 17.0.3 Via RHSA-2022:1436 https://access.redhat.com/errata/RHSA-2022:1436 This issue has been addressed in the following products: Red Hat Build of OpenJDK 17.0.3 Via RHSA-2022:1437 https://access.redhat.com/errata/RHSA-2022:1437 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-21496 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:2137 https://access.redhat.com/errata/RHSA-2022:2137 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:1729 https://access.redhat.com/errata/RHSA-2022:1729 This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:1728 https://access.redhat.com/errata/RHSA-2022:1728 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Supplementary Via RHSA-2022:4957 https://access.redhat.com/errata/RHSA-2022:4957 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Supplementary Via RHSA-2022:4959 https://access.redhat.com/errata/RHSA-2022:4959 This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:5837 https://access.redhat.com/errata/RHSA-2022:5837 |