-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: OpenJDK 8u332 Windows builds release and security update Advisory ID: RHSA-2022:1492-01 Product: OpenJDK Advisory URL: https://access.redhat.com/errata/RHSA-2022:1492 Issue date: 2022-04-28 CVE Names: CVE-2022-21426 CVE-2022-21434 CVE-2022-21443 CVE-2022-21476 CVE-2022-21496 ==================================================================== 1. Summary: The Red Hat build of OpenJDK 8 (java-1.8.0-openjdk) is now available for Windows. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. This release of the Red Hat build of OpenJDK 8 (8u332) for Windows serves as a replacement for the Red Hat build of OpenJDK 8 (8u322) and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section. Security Fix(es): * OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) (CVE-2022-21426) * OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) (CVE-2022-21443) * OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) (CVE-2022-21434) * OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) (CVE-2022-21476) * OpenJDK: URI parsing inconsistencies (JNDI, 8278972) (CVE-2022-21496) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_windows/index 4. Bugs fixed (https://bugzilla.redhat.com/): 2075788 - CVE-2022-21426 OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) 2075793 - CVE-2022-21443 OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) 2075836 - CVE-2022-21434 OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) 2075842 - CVE-2022-21476 OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) 2075849 - CVE-2022-21496 OpenJDK: URI parsing inconsistencies (JNDI, 8278972) 5. References: https://access.redhat.com/security/cve/CVE-2022-21426 https://access.redhat.com/security/cve/CVE-2022-21434 https://access.redhat.com/security/cve/CVE-2022-21443 https://access.redhat.com/security/cve/CVE-2022-21476 https://access.redhat.com/security/cve/CVE-2022-21496 https://access.redhat.com/security/updates/classification/#important 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYmsX2tzjgjWX9erEAQjKvA//UTe/pEDDJ8r8Y9dF4mEo/PqLEcZIreWy 7JIghxMGp0Uz+i8THwgJDPF2pg9qAcZ1zhZYlAthwPcNrzZsSGeBxY4ETf/jFGPg c7yD4SJubqPxL+jc8Uu7bJGoNKHwbx4MuhUYEF2XE32WGC3ImrAueAlhjnk2Smjr ylJE1WDXIWvcMdiZzOT1t+wPSJtAT4pchdQDnnC1j13w2eHpyzTiLUdjutFzuuO9 G5ive5MX1n9I2ug5ef1gg7KQ1ikRp2cuIccRcIig2Q9jVuaoY6JCJLu3b1FtMt+u LOC4udxjq25w0vAe8sfw6dER3y20nzZK3v9L0xYMcss3Ar6puqozG/eEQ8Z5mRH7 68tDwZCLO35dx6bPP64CNKmCjBHdRKtcYR6Z66F40Ejha97Nc0yhJGj9rUAVbEvW DXuFIoQEnSt3ntywPgOIizwIFQDHbQhiH7MvQxcacP5OXgqTz2YWZcixThYy7leS r1rc/v3/uQNpNv5rFlLiZsFx50ZPdY3Co2hAuIO9QvEGOobcqQEPGagDwUeuMEQz 08VIGI+dHwM7fkjv2bM2BRjDudgHXBMh492uYJxpPjIF8OT37lD/rpRQagZnrFIN Ds/zkU0kZh4E+I4xtiKykVDkpDv0k5MgTdeKeToHcsTWKeT3W+tt4LAvxbuBaG1s +W3sfCysus0=RIyt -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce