First published: Thu Apr 28 2022(Updated: )
The OpenJDK 17 packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.<br>This release of the Red Hat build of OpenJDK 17 (17.0.3) for portable Linux<br>serves as a replacement for the Red Hat build of OpenJDK 17 (17.0.2) and<br>includes security and bug fixes, and enhancements. For further information,<br>refer to the release notes linked to in the References section.<br>Security Fix(es):<br><li> OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) (CVE-2022-21426)</li> <li> OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) (CVE-2022-21443)</li> <li> OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) (CVE-2022-21434)</li> <li> OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) (CVE-2022-21476)</li> <li> OpenJDK: URI parsing inconsistencies (JNDI, 8278972) (CVE-2022-21496)</li> <li> OpenJDK: Improper ECDSA signature verification (Libraries, 8277233) (CVE-2022-21449)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Java 17 OpenJDK Headless | ||
Red Hat Java 17 OpenJDK Headless | <17.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:1436 is classified as important.
To fix RHSA-2022:1436, you should update to the latest available version of the OpenJDK packages.
RHSA-2022:1436 affects the Red Hat build of OpenJDK 17 (17.0.2) and earlier versions.
No, RHSA-2022:1436 is not classified as a critical vulnerability; it is marked as important.
RHSA-2022:1436 includes bug fixes and enhancements over the previous versions of OpenJDK 17.