First published: Thu Jan 27 2022(Updated: )
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.<br>Security Fix(es):<br><li> OpenJDK: Incomplete deserialization class filtering in ObjectInputStream (Serialization, 8264934) (CVE-2022-21248)</li> <li> OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP, 8270492) (CVE-2022-21282)</li> <li> OpenJDK: Unexpected exception thrown in regex Pattern (Libraries, 8268813) (CVE-2022-21283)</li> <li> OpenJDK: Incomplete checks of StringBuffer and StringBuilder during deserialization (Libraries, 8270392) (CVE-2022-21293)</li> <li> OpenJDK: Incorrect IdentityHashMap size checks during deserialization (Libraries, 8270416) (CVE-2022-21294)</li> <li> OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498) (CVE-2022-21296)</li> <li> OpenJDK: Infinite loop related to incorrect handling of newlines in XMLEntityScanner (JAXP, 8270646) (CVE-2022-21299)</li> <li> OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014) (CVE-2022-21305)</li> <li> OpenJDK: Excessive resource use when reading JAR manifest attributes (Libraries, 8272026) (CVE-2022-21340)</li> <li> OpenJDK: Insufficient checks when deserializing exceptions in ObjectInputStream (Serialization, 8272236) (CVE-2022-21341)</li> <li> OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756) (CVE-2022-21360)</li> <li> OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838) (CVE-2022-21365)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <1.8.0-openjdk-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-debugsource-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-debugsource-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-demo-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-demo-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-demo-debuginfo-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-demo-debuginfo-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-devel-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-devel-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-devel-debuginfo-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-devel-debuginfo-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-headless-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-headless-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-headless-debuginfo-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-headless-debuginfo-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-javadoc-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-javadoc-zip-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-slowdebug-debuginfo-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-slowdebug-debuginfo-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-src-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-src-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-accessibility-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-debuginfo-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-debugsource-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-debugsource-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-demo-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-demo-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-demo-debuginfo-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-demo-debuginfo-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-devel-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-devel-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-devel-debuginfo-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-devel-debuginfo-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-headless-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-headless-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-headless-debuginfo-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-headless-debuginfo-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-slowdebug-debuginfo-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-slowdebug-debuginfo-1.8.0.322.b06-1.el8_1 |
redhat/java | <1.8.0-openjdk-src-1.8.0.322.b06-1.el8_1 | 1.8.0-openjdk-src-1.8.0.322.b06-1.el8_1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:0304 is high due to the potential for remote code execution through incomplete deserialization filtering.
To fix RHSA-2022:0304, upgrade to the fixed version of the OpenJDK package, specifically 1.8.0-openjdk-1.8.0.322.b06-1.el8_1.
CVE-2022-21248 describes an incomplete deserialization class filtering vulnerability in OpenJDK that could allow attackers to execute malicious code.
Various systems using OpenJDK 8, particularly those running the specified vulnerable version, are affected by RHSA-2022:0304.
Yes, RHSA-2022:0304 addresses a security flaw in the Java runtime environment that could be exploited if not patched.