Bug 2075849 (CVE-2022-21496)

Summary: CVE-2022-21496 OpenJDK: URI parsing inconsistencies (JNDI, 8278972)
Product: [Other] Security Response Reporter: Mauro Matteo Cascella <mcascell>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: ahughes, chazlett, dbhole, dfitzmau, jdowland, jhuttana, jochrist, jvanek, nengard, neugens, pjindal, security-response-team, sraghupu
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-04-29 00:16:09 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2073575, 2073576, 2073577, 2073578, 2073579, 2073587, 2073589, 2073590, 2073591, 2073592, 2073593, 2073594, 2073595, 2073601, 2074639, 2074641, 2074642, 2074643, 2074644, 2074645, 2074646, 2074649, 2074650, 2088330, 2092639, 2092640, 2094031    
Bug Blocks: 2073424    

Description Mauro Matteo Cascella 2022-04-15 17:06:29 UTC
Inconsistencies were found in the way the java.net.URI and com.sun.jndi.toolkit.url.URI classes in the JNDI component of OpenJDK parsed URI strings. These inconsistencies could be used to make a Java application accept invalid or malformed URI strings.

Parsing of URL strings in built-in JNDI providers were made more strict as part of the fix. For more information, see the following release notes for Oracle JDK 7u341, 8u331, 11.0.15, 17.0.3, 18.0.1:

https://www.oracle.com/java/technologies/javase/7-support-relnotes.html#JDK-8278972
https://www.oracle.com/java/technologies/javase/8u331-relnotes.html#JDK-8278972
https://www.oracle.com/java/technologies/javase/11-0-15-relnotes.html#JDK-8278972
https://www.oracle.com/java/technologies/javase/17-0-3-relnotes.html#JDK-8278972
https://www.oracle.com/java/technologies/javase/18-0-1-relnotes.html#JDK-8278972

Comment 7 errata-xmlrpc 2022-04-20 12:38:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Extended Update Support

Via RHSA-2022:1443 https://access.redhat.com/errata/RHSA-2022:1443

Comment 8 errata-xmlrpc 2022-04-20 12:50:30 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2022:1444 https://access.redhat.com/errata/RHSA-2022:1444

Comment 9 errata-xmlrpc 2022-04-20 13:08:51 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2022:1441 https://access.redhat.com/errata/RHSA-2022:1441

Comment 10 errata-xmlrpc 2022-04-20 13:28:33 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:1445 https://access.redhat.com/errata/RHSA-2022:1445

Comment 12 errata-xmlrpc 2022-04-20 14:14:42 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:1442 https://access.redhat.com/errata/RHSA-2022:1442

Comment 13 Mauro Matteo Cascella 2022-04-20 15:21:57 UTC
Oracle CPU April 2022:

https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixJAVA

Fixed in Oracle Java SE 7u341, 8u331, 11.0.15, 17.0.3, 18.0.1.

Comment 14 errata-xmlrpc 2022-04-20 15:24:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2022:1440 https://access.redhat.com/errata/RHSA-2022:1440

Comment 15 errata-xmlrpc 2022-04-25 13:47:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2022:1487 https://access.redhat.com/errata/RHSA-2022:1487

Comment 16 errata-xmlrpc 2022-04-25 14:59:30 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2022:1488 https://access.redhat.com/errata/RHSA-2022:1488

Comment 17 errata-xmlrpc 2022-04-25 15:00:11 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Extended Update Support

Via RHSA-2022:1489 https://access.redhat.com/errata/RHSA-2022:1489

Comment 18 errata-xmlrpc 2022-04-25 15:09:14 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2022:1490 https://access.redhat.com/errata/RHSA-2022:1490

Comment 19 errata-xmlrpc 2022-04-25 15:47:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:1491 https://access.redhat.com/errata/RHSA-2022:1491

Comment 20 errata-xmlrpc 2022-04-28 18:58:33 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 8u332

Via RHSA-2022:1492 https://access.redhat.com/errata/RHSA-2022:1492

Comment 21 errata-xmlrpc 2022-04-28 18:58:51 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 8u332

Via RHSA-2022:1438 https://access.redhat.com/errata/RHSA-2022:1438

Comment 22 errata-xmlrpc 2022-04-28 18:59:38 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 11.0.15

Via RHSA-2022:1435 https://access.redhat.com/errata/RHSA-2022:1435

Comment 23 errata-xmlrpc 2022-04-28 18:59:58 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 11.0.15

Via RHSA-2022:1439 https://access.redhat.com/errata/RHSA-2022:1439

Comment 24 errata-xmlrpc 2022-04-28 19:04:08 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 17.0.3

Via RHSA-2022:1436 https://access.redhat.com/errata/RHSA-2022:1436

Comment 25 errata-xmlrpc 2022-04-28 19:04:36 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 17.0.3

Via RHSA-2022:1437 https://access.redhat.com/errata/RHSA-2022:1437

Comment 26 Product Security DevOps Team 2022-04-29 00:16:07 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-21496

Comment 27 errata-xmlrpc 2022-05-17 23:39:06 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:2137 https://access.redhat.com/errata/RHSA-2022:2137

Comment 28 errata-xmlrpc 2022-05-17 23:39:27 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:1729 https://access.redhat.com/errata/RHSA-2022:1729

Comment 29 errata-xmlrpc 2022-05-17 23:39:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:1728 https://access.redhat.com/errata/RHSA-2022:1728

Comment 30 errata-xmlrpc 2022-06-08 12:25:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Supplementary

Via RHSA-2022:4957 https://access.redhat.com/errata/RHSA-2022:4957

Comment 31 errata-xmlrpc 2022-06-08 12:35:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Supplementary

Via RHSA-2022:4959 https://access.redhat.com/errata/RHSA-2022:4959

Comment 32 errata-xmlrpc 2022-08-02 08:03:23 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:5837 https://access.redhat.com/errata/RHSA-2022:5837