A flaw was found in Apache Santuario (XML Security for Java) in the way it processed some paths. A remote attacker could use this flaw to circumvent the "secure validation" feature and disclose potentially sensitive information in local XML files.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2022:1443 https://access.redhat.com/errata/RHSA-2022:1443
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2022:1444 https://access.redhat.com/errata/RHSA-2022:1444
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:1441 https://access.redhat.com/errata/RHSA-2022:1441
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1445 https://access.redhat.com/errata/RHSA-2022:1445
OpenJDK-17 upstream commit: https://github.com/openjdk/jdk17u/commit/0cc9d30292a06e30c1d6dff9684cd219704b56ee OpenJDK-11 upstream commit: https://github.com/openjdk/jdk11u-dev/commit/af99bc3ac9b0ba5cc18b049d245c0c34a9a55800 OpenJDK-8 upstream commit: http://hg.openjdk.java.net/jdk8u/monojdk8u/rev/c101d7eb3679
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1442 https://access.redhat.com/errata/RHSA-2022:1442
Oracle CPU April 2022: https://www.oracle.com/security-alerts/cpuapr2022.html#AppendixJAVA Fixed in Oracle Java SE 7u341, 8u331, 11.0.15, 17.0.3, 18.0.1.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2022:1440 https://access.redhat.com/errata/RHSA-2022:1440
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2022:1487 https://access.redhat.com/errata/RHSA-2022:1487
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2022:1488 https://access.redhat.com/errata/RHSA-2022:1488
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2022:1489 https://access.redhat.com/errata/RHSA-2022:1489
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:1490 https://access.redhat.com/errata/RHSA-2022:1490
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:1491 https://access.redhat.com/errata/RHSA-2022:1491
This issue has been addressed in the following products: Red Hat Build of OpenJDK 8u332 Via RHSA-2022:1492 https://access.redhat.com/errata/RHSA-2022:1492
This issue has been addressed in the following products: Red Hat Build of OpenJDK 8u332 Via RHSA-2022:1438 https://access.redhat.com/errata/RHSA-2022:1438
This issue has been addressed in the following products: Red Hat Build of OpenJDK 11.0.15 Via RHSA-2022:1435 https://access.redhat.com/errata/RHSA-2022:1435
This issue has been addressed in the following products: Red Hat Build of OpenJDK 11.0.15 Via RHSA-2022:1439 https://access.redhat.com/errata/RHSA-2022:1439
This issue has been addressed in the following products: Red Hat Build of OpenJDK 17.0.3 Via RHSA-2022:1436 https://access.redhat.com/errata/RHSA-2022:1436
This issue has been addressed in the following products: Red Hat Build of OpenJDK 17.0.3 Via RHSA-2022:1437 https://access.redhat.com/errata/RHSA-2022:1437
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-21476
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:2137 https://access.redhat.com/errata/RHSA-2022:2137
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:1729 https://access.redhat.com/errata/RHSA-2022:1729
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2022:1728 https://access.redhat.com/errata/RHSA-2022:1728