Headline
RHSA-2022:7004: Red Hat Security Advisory: java-1.8.0-openjdk security update
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526)
- CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910)
- CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533)
- CVE-2022-21628: OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918)
Synopsis
Moderate: java-1.8.0-openjdk security update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
Security Fix(es):
- OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) (CVE-2022-21626)
- OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918) (CVE-2022-21628)
- OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) (CVE-2022-21619)
- OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) (CVE-2022-21624)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
All running instances of OpenJDK Java must be restarted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2 x86_64
- Red Hat Enterprise Linux Server - AUS 8.2 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.2 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2 x86_64
Fixes
- BZ - 2133745 - CVE-2022-21619 OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526)
- BZ - 2133753 - CVE-2022-21626 OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533)
- BZ - 2133765 - CVE-2022-21624 OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910)
- BZ - 2133769 - CVE-2022-21628 OpenJDK: HttpServer no connection count limit (Lightweight HTTP Server, 8286918)
CVEs
- CVE-2022-21619
- CVE-2022-21624
- CVE-2022-21626
- CVE-2022-21628
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.2
SRPM
java-1.8.0-openjdk-1.8.0.352.b08-2.el8_2.src.rpm
SHA-256: 12d83d5f7ac4f7be8c4e3f5be09b2bae5a57c4ed8bc8842955d624e55244138d
x86_64
java-1.8.0-openjdk-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 80754c577553de8731e879db98ed8c73d05397f3ca2c870b0d54daa8b6fa9cee
java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 47d5b7e88cf86fa32e7f431e8b45890f518f1f38f256f1537bb97b69c69a9677
java-1.8.0-openjdk-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 8402b66a7e6aabe50be3461f564c04c383cdeac70b58a4acb822379461f17dbd
java-1.8.0-openjdk-debugsource-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: addc1624c1916589cf81d668109405da0094e4c70d61a9300d76194e321dfe21
java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 90e044c1fdc9ca50b277d3f435fc2066ab006b6835d5dd9e3bcdc8701e8ef18e
java-1.8.0-openjdk-demo-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 06d95298953673cba514bf3176753a1953560ca3adbaa68a0c147b6bb63ceea7
java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 6206dcd4709c0e48c660f6e78f6f1a95865e7550620f7b684887d0d6c9681358
java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 8b98f899df7853466932f7160a06df2f15d12df87c0e37afe49882c8ee972e2f
java-1.8.0-openjdk-devel-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 6df1b3694f87b18725dd283a0efc2577fae9a2ff21c36dea27260560689fb816
java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 587f29504074713655ae5cc108b1a466fdc0901e0535c29b648d0f4faaf25e23
java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 0d568b87777e76de4e791c1fd9f51afe7320302f57c03d243adecb96edf62674
java-1.8.0-openjdk-headless-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: de3d30cc9c3036d469172bfba5e6b7779a779fe6f6ca9cf66b6f4387a24558d5
java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 10db5081cbf484b318ee787cfdd657f37f43f4332c31643cb75cca5e4b4f5c0c
java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el8_2.noarch.rpm
SHA-256: 67c1ffec07270dccfa78474443efdb884080f81b6ccffbca437181b9caf9ca99
java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el8_2.noarch.rpm
SHA-256: f48173ddaf41009f4b77eb7b2d9fdbbad7803cbcadcc01966985165375ba92af
java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 085e6dfd9495cfeb37ab843d2e99039178b3c00f949a0763138fcc9fdbb40c0c
java-1.8.0-openjdk-src-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 3aaeae72d953dddf0f8455b1bd988c0e596bcc25e27d404cc40256df08d47a5d
Red Hat Enterprise Linux Server - AUS 8.2
SRPM
java-1.8.0-openjdk-1.8.0.352.b08-2.el8_2.src.rpm
SHA-256: 12d83d5f7ac4f7be8c4e3f5be09b2bae5a57c4ed8bc8842955d624e55244138d
x86_64
java-1.8.0-openjdk-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 80754c577553de8731e879db98ed8c73d05397f3ca2c870b0d54daa8b6fa9cee
java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 47d5b7e88cf86fa32e7f431e8b45890f518f1f38f256f1537bb97b69c69a9677
java-1.8.0-openjdk-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 8402b66a7e6aabe50be3461f564c04c383cdeac70b58a4acb822379461f17dbd
java-1.8.0-openjdk-debugsource-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: addc1624c1916589cf81d668109405da0094e4c70d61a9300d76194e321dfe21
java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 90e044c1fdc9ca50b277d3f435fc2066ab006b6835d5dd9e3bcdc8701e8ef18e
java-1.8.0-openjdk-demo-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 06d95298953673cba514bf3176753a1953560ca3adbaa68a0c147b6bb63ceea7
java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 6206dcd4709c0e48c660f6e78f6f1a95865e7550620f7b684887d0d6c9681358
java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 8b98f899df7853466932f7160a06df2f15d12df87c0e37afe49882c8ee972e2f
java-1.8.0-openjdk-devel-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 6df1b3694f87b18725dd283a0efc2577fae9a2ff21c36dea27260560689fb816
java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 587f29504074713655ae5cc108b1a466fdc0901e0535c29b648d0f4faaf25e23
java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 0d568b87777e76de4e791c1fd9f51afe7320302f57c03d243adecb96edf62674
java-1.8.0-openjdk-headless-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: de3d30cc9c3036d469172bfba5e6b7779a779fe6f6ca9cf66b6f4387a24558d5
java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 10db5081cbf484b318ee787cfdd657f37f43f4332c31643cb75cca5e4b4f5c0c
java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el8_2.noarch.rpm
SHA-256: 67c1ffec07270dccfa78474443efdb884080f81b6ccffbca437181b9caf9ca99
java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el8_2.noarch.rpm
SHA-256: f48173ddaf41009f4b77eb7b2d9fdbbad7803cbcadcc01966985165375ba92af
java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 085e6dfd9495cfeb37ab843d2e99039178b3c00f949a0763138fcc9fdbb40c0c
java-1.8.0-openjdk-src-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 3aaeae72d953dddf0f8455b1bd988c0e596bcc25e27d404cc40256df08d47a5d
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.2
SRPM
java-1.8.0-openjdk-1.8.0.352.b08-2.el8_2.src.rpm
SHA-256: 12d83d5f7ac4f7be8c4e3f5be09b2bae5a57c4ed8bc8842955d624e55244138d
s390x
java-1.8.0-openjdk-1.8.0.352.b08-2.el8_2.s390x.rpm
SHA-256: 9dae2603575168791a5303e2396f3d31041182f943314b2594cdf60404d145ad
java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el8_2.s390x.rpm
SHA-256: 4d1a43e65264f9b099efa91de94b57a0e5ecd1d9f8a3847dbc73f298bfb1daa2
java-1.8.0-openjdk-debuginfo-1.8.0.352.b08-2.el8_2.s390x.rpm
SHA-256: 5b615d3d364989dbd0ed766d8b0f9e31c47acafb3872fcde942baeedcd2634a6
java-1.8.0-openjdk-debugsource-1.8.0.352.b08-2.el8_2.s390x.rpm
SHA-256: b7ac7795cb3c75f554de2a6331fa87049bcf9c766ebe414621ff618ab9c21787
java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el8_2.s390x.rpm
SHA-256: dac673647ca06a26b688549943070a1eb02eb1ad6cf2f7b459647fd1520a1120
java-1.8.0-openjdk-demo-debuginfo-1.8.0.352.b08-2.el8_2.s390x.rpm
SHA-256: 553decd5543eacf662dd32bdaa1bbc817cb2fc8e14a14efafcd89fa9cabc6466
java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el8_2.s390x.rpm
SHA-256: 5dbf33c0cf97975e0bd5291ec57185e14d8eaf91c0ab48be9f81b4bd126ccaa7
java-1.8.0-openjdk-devel-debuginfo-1.8.0.352.b08-2.el8_2.s390x.rpm
SHA-256: 89177af6a0091eacdb5ec1917d3b3d0d3728894b694d5c52c17fd4a8b732fde2
java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el8_2.s390x.rpm
SHA-256: cd1e0335016e815d63279e98d773e38a9839b494eefaa4df5b7bcf95c6eb008e
java-1.8.0-openjdk-headless-debuginfo-1.8.0.352.b08-2.el8_2.s390x.rpm
SHA-256: a0ea9ee3b6171fdc7610db77e75766c1cb1c47fd5a76f69876fdead23a8b243f
java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el8_2.noarch.rpm
SHA-256: 67c1ffec07270dccfa78474443efdb884080f81b6ccffbca437181b9caf9ca99
java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el8_2.noarch.rpm
SHA-256: f48173ddaf41009f4b77eb7b2d9fdbbad7803cbcadcc01966985165375ba92af
java-1.8.0-openjdk-src-1.8.0.352.b08-2.el8_2.s390x.rpm
SHA-256: 2bc33558636a4917e18cd90cef6930177f06e3eebece144d1693fe84c41cbda3
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.2
SRPM
java-1.8.0-openjdk-1.8.0.352.b08-2.el8_2.src.rpm
SHA-256: 12d83d5f7ac4f7be8c4e3f5be09b2bae5a57c4ed8bc8842955d624e55244138d
ppc64le
java-1.8.0-openjdk-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: 3e90eb637be60c9ea6840fa1e5f64b1b5c89edf8104629c057d8f903d807a5d2
java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: fc3787fd948b789c359b11499f9a032a6a50c8a3290a32f8d0ea98a4302b71a5
java-1.8.0-openjdk-debuginfo-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: d1a9a82e06093ed3fd3a508bbc876646645302046778385d145a2a1f4f8d73e3
java-1.8.0-openjdk-debugsource-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: 12d14e76ce24ba41713ea302cfcf701c3dbb4ef641250b6b4edddc3e7825c6e8
java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: b258ed41d1f9c443657b45817e899b15dd73c4c4f206104c59581491f1b6cdc7
java-1.8.0-openjdk-demo-debuginfo-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: 81006e29adaafe85c97f9fa43a542bc7276f1ac690d63684c52ec5c5f8e46b7a
java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: a00ff2710556b824d2ddc8687b3e396c76b259ffcbdf18fc65d8080b14e13b8f
java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: 5fd5c719b6aec775ba2c5dcacc1603a4a2d28d3fe4ef248685a03a329a8cea77
java-1.8.0-openjdk-devel-debuginfo-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: 9ba46b9ccd3defa83046fda19153b1c3b2a542944f5c9d729528e6090cee7356
java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: b826682b060e5fc8915fc6b4c72e47830a6460d321c34067dbf6c4f9f3aa74df
java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: fcbbb4ecb17079e63b4cc0ce31239a9f34fccd4459413dbfa63c24c5b3d7c238
java-1.8.0-openjdk-headless-debuginfo-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: 2c66ca327f60a06f0510353e2030e278a97f6d4e67eabde2f47f014464d745b5
java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: 52bf4bce283332642c04fd89b2799c944dc7da9218a047eed44f959c777ff05d
java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el8_2.noarch.rpm
SHA-256: 67c1ffec07270dccfa78474443efdb884080f81b6ccffbca437181b9caf9ca99
java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el8_2.noarch.rpm
SHA-256: f48173ddaf41009f4b77eb7b2d9fdbbad7803cbcadcc01966985165375ba92af
java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: b0ecd129f4f29f8b85beacb765c221b6c6bdd04c5b375531cc061787ff222015
java-1.8.0-openjdk-src-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: 622234449c746be0491e5b4d848799911eeaee3559fe953a8547f567415e6786
Red Hat Enterprise Linux Server - TUS 8.2
SRPM
java-1.8.0-openjdk-1.8.0.352.b08-2.el8_2.src.rpm
SHA-256: 12d83d5f7ac4f7be8c4e3f5be09b2bae5a57c4ed8bc8842955d624e55244138d
x86_64
java-1.8.0-openjdk-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 80754c577553de8731e879db98ed8c73d05397f3ca2c870b0d54daa8b6fa9cee
java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 47d5b7e88cf86fa32e7f431e8b45890f518f1f38f256f1537bb97b69c69a9677
java-1.8.0-openjdk-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 8402b66a7e6aabe50be3461f564c04c383cdeac70b58a4acb822379461f17dbd
java-1.8.0-openjdk-debugsource-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: addc1624c1916589cf81d668109405da0094e4c70d61a9300d76194e321dfe21
java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 90e044c1fdc9ca50b277d3f435fc2066ab006b6835d5dd9e3bcdc8701e8ef18e
java-1.8.0-openjdk-demo-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 06d95298953673cba514bf3176753a1953560ca3adbaa68a0c147b6bb63ceea7
java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 6206dcd4709c0e48c660f6e78f6f1a95865e7550620f7b684887d0d6c9681358
java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 8b98f899df7853466932f7160a06df2f15d12df87c0e37afe49882c8ee972e2f
java-1.8.0-openjdk-devel-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 6df1b3694f87b18725dd283a0efc2577fae9a2ff21c36dea27260560689fb816
java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 587f29504074713655ae5cc108b1a466fdc0901e0535c29b648d0f4faaf25e23
java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 0d568b87777e76de4e791c1fd9f51afe7320302f57c03d243adecb96edf62674
java-1.8.0-openjdk-headless-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: de3d30cc9c3036d469172bfba5e6b7779a779fe6f6ca9cf66b6f4387a24558d5
java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 10db5081cbf484b318ee787cfdd657f37f43f4332c31643cb75cca5e4b4f5c0c
java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el8_2.noarch.rpm
SHA-256: 67c1ffec07270dccfa78474443efdb884080f81b6ccffbca437181b9caf9ca99
java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el8_2.noarch.rpm
SHA-256: f48173ddaf41009f4b77eb7b2d9fdbbad7803cbcadcc01966985165375ba92af
java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 085e6dfd9495cfeb37ab843d2e99039178b3c00f949a0763138fcc9fdbb40c0c
java-1.8.0-openjdk-src-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 3aaeae72d953dddf0f8455b1bd988c0e596bcc25e27d404cc40256df08d47a5d
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.2
SRPM
java-1.8.0-openjdk-1.8.0.352.b08-2.el8_2.src.rpm
SHA-256: 12d83d5f7ac4f7be8c4e3f5be09b2bae5a57c4ed8bc8842955d624e55244138d
aarch64
java-1.8.0-openjdk-1.8.0.352.b08-2.el8_2.aarch64.rpm
SHA-256: 9d307d12c5c1a048aff5751e5aeada34e7537ff44ef567bfe0d6d7dfb4cb50a1
java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el8_2.aarch64.rpm
SHA-256: 2c207aed97879819e97b39f65be05621a3496a683afeaaad314be28cce18bfa6
java-1.8.0-openjdk-debuginfo-1.8.0.352.b08-2.el8_2.aarch64.rpm
SHA-256: c47eac8b07febf92f0d6d0cdfebe88ade7c8faf1f9b101f810513372cd17e50a
java-1.8.0-openjdk-debugsource-1.8.0.352.b08-2.el8_2.aarch64.rpm
SHA-256: a2e391b34d91a0617658402d0a59d72812e9831672c4b3d9313a06a90b76dda2
java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el8_2.aarch64.rpm
SHA-256: 59971cae727c8d1c31064a3f7f1b5ee4f149d5832fac9d594a692e015091d135
java-1.8.0-openjdk-demo-debuginfo-1.8.0.352.b08-2.el8_2.aarch64.rpm
SHA-256: b424ed21883c6f851a34ec38e67046f093f84214d17041ada72e7df2def1e9f5
java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.aarch64.rpm
SHA-256: 71099d6d35960827c13701de7a2186b5763a9422e8582260d231228fcec2cf90
java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el8_2.aarch64.rpm
SHA-256: 5ede157149d373573fb892b869c55b9ac3317b4ad236b90bf44d5c8547b7d7ac
java-1.8.0-openjdk-devel-debuginfo-1.8.0.352.b08-2.el8_2.aarch64.rpm
SHA-256: ab0d1a152f8df8f0e009554a2943a57890e1c720520b485d959e941c56792967
java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.aarch64.rpm
SHA-256: e621718e9fad51d9afc8cfbb985d477e55242c7d63830a45d58b4ebc0e88778b
java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el8_2.aarch64.rpm
SHA-256: cb7acf98190dcef5db6a7a1b7d24fdd5ba012bf7967cd3f70dcb0b26b4b3be7e
java-1.8.0-openjdk-headless-debuginfo-1.8.0.352.b08-2.el8_2.aarch64.rpm
SHA-256: de1da1d75a3e3f64cb623f259684ccd4cd0d313c6bb78b22e8fafaf3c3bdc049
java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.aarch64.rpm
SHA-256: 11756ca6c5f0282a9f9af2cc83027087e9d1a4ee1fb28ada91c22eed49515aaf
java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el8_2.noarch.rpm
SHA-256: 67c1ffec07270dccfa78474443efdb884080f81b6ccffbca437181b9caf9ca99
java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el8_2.noarch.rpm
SHA-256: f48173ddaf41009f4b77eb7b2d9fdbbad7803cbcadcc01966985165375ba92af
java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.aarch64.rpm
SHA-256: 08c3617cb4d90b58eb3ad81fdf49cdfd5a83381af045415003780f1a0a2a96d8
java-1.8.0-openjdk-src-1.8.0.352.b08-2.el8_2.aarch64.rpm
SHA-256: b1b323a56e80f63fc3f1223e19e6b809b8ef410c22964d1b60206bb2e4704014
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.2
SRPM
java-1.8.0-openjdk-1.8.0.352.b08-2.el8_2.src.rpm
SHA-256: 12d83d5f7ac4f7be8c4e3f5be09b2bae5a57c4ed8bc8842955d624e55244138d
ppc64le
java-1.8.0-openjdk-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: 3e90eb637be60c9ea6840fa1e5f64b1b5c89edf8104629c057d8f903d807a5d2
java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: fc3787fd948b789c359b11499f9a032a6a50c8a3290a32f8d0ea98a4302b71a5
java-1.8.0-openjdk-debuginfo-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: d1a9a82e06093ed3fd3a508bbc876646645302046778385d145a2a1f4f8d73e3
java-1.8.0-openjdk-debugsource-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: 12d14e76ce24ba41713ea302cfcf701c3dbb4ef641250b6b4edddc3e7825c6e8
java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: b258ed41d1f9c443657b45817e899b15dd73c4c4f206104c59581491f1b6cdc7
java-1.8.0-openjdk-demo-debuginfo-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: 81006e29adaafe85c97f9fa43a542bc7276f1ac690d63684c52ec5c5f8e46b7a
java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: a00ff2710556b824d2ddc8687b3e396c76b259ffcbdf18fc65d8080b14e13b8f
java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: 5fd5c719b6aec775ba2c5dcacc1603a4a2d28d3fe4ef248685a03a329a8cea77
java-1.8.0-openjdk-devel-debuginfo-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: 9ba46b9ccd3defa83046fda19153b1c3b2a542944f5c9d729528e6090cee7356
java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: b826682b060e5fc8915fc6b4c72e47830a6460d321c34067dbf6c4f9f3aa74df
java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: fcbbb4ecb17079e63b4cc0ce31239a9f34fccd4459413dbfa63c24c5b3d7c238
java-1.8.0-openjdk-headless-debuginfo-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: 2c66ca327f60a06f0510353e2030e278a97f6d4e67eabde2f47f014464d745b5
java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: 52bf4bce283332642c04fd89b2799c944dc7da9218a047eed44f959c777ff05d
java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el8_2.noarch.rpm
SHA-256: 67c1ffec07270dccfa78474443efdb884080f81b6ccffbca437181b9caf9ca99
java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el8_2.noarch.rpm
SHA-256: f48173ddaf41009f4b77eb7b2d9fdbbad7803cbcadcc01966985165375ba92af
java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: b0ecd129f4f29f8b85beacb765c221b6c6bdd04c5b375531cc061787ff222015
java-1.8.0-openjdk-src-1.8.0.352.b08-2.el8_2.ppc64le.rpm
SHA-256: 622234449c746be0491e5b4d848799911eeaee3559fe953a8547f567415e6786
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.2
SRPM
java-1.8.0-openjdk-1.8.0.352.b08-2.el8_2.src.rpm
SHA-256: 12d83d5f7ac4f7be8c4e3f5be09b2bae5a57c4ed8bc8842955d624e55244138d
x86_64
java-1.8.0-openjdk-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 80754c577553de8731e879db98ed8c73d05397f3ca2c870b0d54daa8b6fa9cee
java-1.8.0-openjdk-accessibility-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 47d5b7e88cf86fa32e7f431e8b45890f518f1f38f256f1537bb97b69c69a9677
java-1.8.0-openjdk-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 8402b66a7e6aabe50be3461f564c04c383cdeac70b58a4acb822379461f17dbd
java-1.8.0-openjdk-debugsource-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: addc1624c1916589cf81d668109405da0094e4c70d61a9300d76194e321dfe21
java-1.8.0-openjdk-demo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 90e044c1fdc9ca50b277d3f435fc2066ab006b6835d5dd9e3bcdc8701e8ef18e
java-1.8.0-openjdk-demo-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 06d95298953673cba514bf3176753a1953560ca3adbaa68a0c147b6bb63ceea7
java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 6206dcd4709c0e48c660f6e78f6f1a95865e7550620f7b684887d0d6c9681358
java-1.8.0-openjdk-devel-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 8b98f899df7853466932f7160a06df2f15d12df87c0e37afe49882c8ee972e2f
java-1.8.0-openjdk-devel-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 6df1b3694f87b18725dd283a0efc2577fae9a2ff21c36dea27260560689fb816
java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 587f29504074713655ae5cc108b1a466fdc0901e0535c29b648d0f4faaf25e23
java-1.8.0-openjdk-headless-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 0d568b87777e76de4e791c1fd9f51afe7320302f57c03d243adecb96edf62674
java-1.8.0-openjdk-headless-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: de3d30cc9c3036d469172bfba5e6b7779a779fe6f6ca9cf66b6f4387a24558d5
java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 10db5081cbf484b318ee787cfdd657f37f43f4332c31643cb75cca5e4b4f5c0c
java-1.8.0-openjdk-javadoc-1.8.0.352.b08-2.el8_2.noarch.rpm
SHA-256: 67c1ffec07270dccfa78474443efdb884080f81b6ccffbca437181b9caf9ca99
java-1.8.0-openjdk-javadoc-zip-1.8.0.352.b08-2.el8_2.noarch.rpm
SHA-256: f48173ddaf41009f4b77eb7b2d9fdbbad7803cbcadcc01966985165375ba92af
java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 085e6dfd9495cfeb37ab843d2e99039178b3c00f949a0763138fcc9fdbb40c0c
java-1.8.0-openjdk-src-1.8.0.352.b08-2.el8_2.x86_64.rpm
SHA-256: 3aaeae72d953dddf0f8455b1bd988c0e596bcc25e27d404cc40256df08d47a5d
Related news
Gentoo Linux Security Advisory 202409-26 - Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution. Versions less than or equal to 3.21.0 are affected.
Previous versions of HP Device Manager (prior to HPDM 5.0.10) could potentially allow command injection and/or elevation of privileges.
Dell VxRail versions earlier than 7.0.450, contain(s) an OS command injection vulnerability in VxRail Manager. A local authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
Debian Linux Security Advisory 5331-1 - Several vulnerabilities have been discovered in the OpenJDK Java runtime, which may result in denial of service or spoofing.
Red Hat Security Advisory 2022-8938-01 - Version 1.26.0 of the OpenShift Serverless Operator is supported on Red Hat OpenShift Container Platform versions 4.8, 4.9, 4.10, and 4.11. This release includes security and bug fixes, and enhancements.
Red Hat Security Advisory 2022-8880-01 - IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR7-FP20. Issues addressed include a randomization vulnerability.
Red Hat OpenShift Container Platform release 4.8.53 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-26945: go-getter: command injection vulnerability * CVE-2022-30321: go-getter: unsafe download (issue 1 of 3) * CVE-2022-30322: go-getter: unsafe download (issue 2 of 3) * CVE-2022-30323: go...
An update is now available for OpenShift Logging 5.3. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-32149: golang: golang.org/x/text/language: ParseAcceptLanguage takes a long time to parse complex tags
Red Hat OpenShift Container Platform release 4.9.51 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.9.51 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-26945: go-getter: command injection vulnerability * CVE-2022-30321: go-getter: unsafe download (issue 1 of 3) * CVE-2022-30322: go-getter: unsafe download (issue 2 of 3) * CVE-2022-30323: ...
Red Hat OpenShift Container Platform release 4.10.39 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container Platform 4.10. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-26945: go-getter: command injection vulnerability * CVE-2022-30321: go-getter: unsafe download (issue 1 of 3) * CVE-2022-30322: go-getter: unsafe download (issue 2 of 3) * CVE-2022-30323: ...
Red Hat Security Advisory 2022-7051-01 - The OpenJDK 17 packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit. This release of the Red Hat build of OpenJDK 17 for Windows serves as a replacement for the Red Hat build of OpenJDK 17 and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section. Issues addressed include buffer overflow and randomization vulnerabilities.
Red Hat Security Advisory 2022-7049-01 - The OpenJDK 8 packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. This release of the Red Hat build of OpenJDK 8 for Windows serves as a replacement for the Red Hat build of OpenJDK 8 and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section. Issues addressed include a randomization vulnerability.
Red Hat Security Advisory 2022-7052-01 - The OpenJDK 11 packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. This release of the Red Hat build of OpenJDK 11 for Windows serves as a replacement for the Red Hat build of OpenJDK 11 and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section. Issues addressed include buffer overflow and randomization vulnerabilities.
Red Hat Security Advisory 2022-7013-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include buffer overflow and randomization vulnerabilities.
Red Hat Security Advisory 2022-7003-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Issues addressed include a randomization vulnerability.
Red Hat Security Advisory 2022-7009-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include buffer overflow and randomization vulnerabilities.
Red Hat Security Advisory 2022-7011-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include buffer overflow and randomization vulnerabilities.
Red Hat Security Advisory 2022-7012-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Issues addressed include buffer overflow and randomization vulnerabilities.
The Red Hat build of OpenJDK 17 (java-17-openjdk) is now available for Windows. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 ce...
The Red Hat Build of OpenJDK 11 (java-11-openjdk) is now available for portable Linux. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X...
The Red Hat Build of OpenJDK 11 (java-11-openjdk) is now available for Windows. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 ce...
The Red Hat build of OpenJDK 8 (java-1.8.0-openjdk) is now available for portable Linux. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) * CVE-2022-21628: OpenJDK: HttpServer no connection co...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 cer...
An update for java-17-openjdk is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 cer...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 cer...
An update for java-17-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 cer...
An update for java-17-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 cer...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 cer...
An update for java-17-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 cer...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 cer...
An update for java-17-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 cer...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 cer...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 cer...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 cer...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 cer...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 cer...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memo...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memo...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memo...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memo...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memo...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memo...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memo...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memo...
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) * CVE-2022-21628: OpenJDK: HttpServer no connection count lim...
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) * CVE-2022-21628: OpenJDK: HttpServer no connection count lim...
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) * CVE-2022-21628: OpenJDK: HttpServer no connection count lim...
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) * CVE-2022-21628: OpenJDK: HttpServer no connection count lim...
An update for java-17-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memo...
An update for java-17-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memo...
An update for java-17-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memo...
An update for java-17-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memo...
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) * CVE-2022-21628: OpenJDK: HttpServer no connection count lim...
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) * CVE-2022-21628: OpenJDK: HttpServer no connection count lim...
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) * CVE-2022-21628: OpenJDK: HttpServer no connection count lim...
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) * CVE-2022-21628: OpenJDK: HttpServer no connection count lim...
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) * CVE-2022-21628: OpenJDK: HttpServ...
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) * CVE-2022-21628: OpenJDK: HttpServ...
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) * CVE-2022-21628: OpenJDK: HttpServ...
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) * CVE-2022-21628: OpenJDK: HttpServ...
An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: excessive memory allocation in X.509 certificate parsing (Security, 8286533) * CVE-2022-21628: OpenJDK...
An update for java-11-openjdk is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-21618: OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077) * CVE-2022-21619: OpenJDK: improper handling of long NTLM client hostnames (Security, 8286526) * CVE-2022-21624: OpenJDK: insufficient randomization of JNDI DNS port numbers (JNDI, 8286910) * CVE-2022-21626: OpenJDK: exce...
Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: Upload). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Successful attacks of this vulnerability can result in takeover of Oracle Web Applications Desktop Integrator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: Upload). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Successful attacks of this vulnerability can result in takeover of Oracle Web Applications Desktop Integrator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).
Vulnerability in the Oracle Web Applications Desktop Integrator product of Oracle E-Business Suite (component: Upload). Supported versions that are affected are 12.2.3-12.2.11. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Web Applications Desktop Integrator. Successful attacks of this vulnerability can result in takeover of Oracle Web Applications Desktop Integrator. CVSS 3.1 Base Score 9.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).