Bug 2133776 (CVE-2022-39399) - CVE-2022-39399 OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366)
Summary: CVE-2022-39399 OpenJDK: missing SNI caching in HTTP/2 (Networking, 8289366)
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2022-39399
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2133718 2133721 2133727 2133730 2133712 2133713 2133714 2133715 2133716 2133717 2133719 2133720 2133722 2133723 2133724 2133725 2133726 2133728 2133729 2134564
Blocks: 2133694
TreeView+ depends on / blocked
 
Reported: 2022-10-11 11:10 UTC by Mauro Matteo Cascella
Modified: 2023-08-07 09:27 UTC (History)
22 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-11-30 11:27:43 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2022:6999 0 None None None 2022-10-20 08:06:04 UTC
Red Hat Product Errata RHSA-2022:7000 0 None None None 2022-10-19 22:38:22 UTC
Red Hat Product Errata RHSA-2022:7001 0 None None None 2022-10-19 22:24:12 UTC
Red Hat Product Errata RHSA-2022:7008 0 None None None 2022-10-19 22:30:38 UTC
Red Hat Product Errata RHSA-2022:7009 0 None None None 2022-10-19 21:11:52 UTC
Red Hat Product Errata RHSA-2022:7010 0 None None None 2022-10-19 22:28:43 UTC
Red Hat Product Errata RHSA-2022:7011 0 None None None 2022-10-19 22:25:59 UTC
Red Hat Product Errata RHSA-2022:7012 0 None None None 2022-10-19 22:35:13 UTC
Red Hat Product Errata RHSA-2022:7013 0 None None None 2022-10-20 08:04:52 UTC
Red Hat Product Errata RHSA-2022:7051 0 None None None 2022-10-20 10:26:34 UTC
Red Hat Product Errata RHSA-2022:7052 0 None None None 2022-10-20 10:19:03 UTC
Red Hat Product Errata RHSA-2022:7053 0 None None None 2022-10-20 10:28:18 UTC
Red Hat Product Errata RHSA-2022:7054 0 None None None 2022-10-20 10:20:32 UTC

Description Mauro Matteo Cascella 2022-10-11 11:10:24 UTC
A flaw was found in the Networking component of OpenJDK in the way the HTTP/2 protocol implementation cached server connections. This could potentially allow malicious servers connecting from the same IP address to perform a spoofing attack.

Comment 16 errata-xmlrpc 2022-10-19 21:11:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2022:7009 https://access.redhat.com/errata/RHSA-2022:7009

Comment 17 errata-xmlrpc 2022-10-19 22:24:09 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2022:7001 https://access.redhat.com/errata/RHSA-2022:7001

Comment 18 errata-xmlrpc 2022-10-19 22:25:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2022:7011 https://access.redhat.com/errata/RHSA-2022:7011

Comment 19 errata-xmlrpc 2022-10-19 22:28:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Extended Update Support

Via RHSA-2022:7010 https://access.redhat.com/errata/RHSA-2022:7010

Comment 20 errata-xmlrpc 2022-10-19 22:30:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2022:7008 https://access.redhat.com/errata/RHSA-2022:7008

Comment 21 errata-xmlrpc 2022-10-19 22:35:11 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:7012 https://access.redhat.com/errata/RHSA-2022:7012

Comment 22 errata-xmlrpc 2022-10-19 22:38:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:7000 https://access.redhat.com/errata/RHSA-2022:7000

Comment 23 errata-xmlrpc 2022-10-20 08:04:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:7013 https://access.redhat.com/errata/RHSA-2022:7013

Comment 24 errata-xmlrpc 2022-10-20 08:06:01 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:6999 https://access.redhat.com/errata/RHSA-2022:6999

Comment 25 errata-xmlrpc 2022-10-20 10:19:01 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 11.0.17

Via RHSA-2022:7052 https://access.redhat.com/errata/RHSA-2022:7052

Comment 26 errata-xmlrpc 2022-10-20 10:20:30 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 11.0.17

Via RHSA-2022:7054 https://access.redhat.com/errata/RHSA-2022:7054

Comment 27 errata-xmlrpc 2022-10-20 10:26:31 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 17.0.5

Via RHSA-2022:7051 https://access.redhat.com/errata/RHSA-2022:7051

Comment 28 errata-xmlrpc 2022-10-20 10:28:16 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 17.0.5

Via RHSA-2022:7053 https://access.redhat.com/errata/RHSA-2022:7053

Comment 30 Product Security DevOps Team 2022-11-30 11:27:40 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-39399


Note You need to log in before you can comment on or make changes to this bug.