ID

VAR-202204-0593


CVE

CVE-2022-21426


TITLE

Red Hat Security Advisory 2022-1492-01

Trust: 0.1

sources: PACKETSTORM: 166903

DESCRIPTION

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L). -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: java-1.8.0-openjdk security update Advisory ID: RHSA-2022:2137-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:2137 Issue date: 2022-05-17 CVE Names: CVE-2022-21426 CVE-2022-21434 CVE-2022-21443 CVE-2022-21476 CVE-2022-21496 ===================================================================== 1. Summary: An update for java-1.8.0-openjdk is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat CodeReady Linux Builder (v. 9) - aarch64, ppc64le, x86_64 Red Hat Enterprise Linux AppStream (v. 9) - aarch64, noarch, ppc64le, s390x, x86_64 3. Description: The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit. Security Fix(es): * OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) (CVE-2022-21476) * OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) (CVE-2022-21426) * OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) (CVE-2022-21434) * OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) (CVE-2022-21443) * OpenJDK: URI parsing inconsistencies (JNDI, 8278972) (CVE-2022-21496) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of OpenJDK Java must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 2075788 - CVE-2022-21426 OpenJDK: Unbounded memory allocation when compiling crafted XPath expressions (JAXP, 8270504) 2075793 - CVE-2022-21443 OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) 2075836 - CVE-2022-21434 OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) 2075842 - CVE-2022-21476 OpenJDK: Defective secure validation in Apache Santuario (Libraries, 8278008) 2075849 - CVE-2022-21496 OpenJDK: URI parsing inconsistencies (JNDI, 8278972) 6. Package List: Red Hat Enterprise Linux AppStream (v. 9): Source: java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.src.rpm aarch64: java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-demo-fastdebug-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-devel-fastdebug-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-fastdebug-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-headless-fastdebug-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-src-1.8.0.332.b09-1.el9_0.aarch64.rpm noarch: java-1.8.0-openjdk-javadoc-1.8.0.332.b09-1.el9_0.noarch.rpm java-1.8.0-openjdk-javadoc-zip-1.8.0.332.b09-1.el9_0.noarch.rpm ppc64le: java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-demo-fastdebug-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-devel-fastdebug-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-fastdebug-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-headless-fastdebug-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-src-1.8.0.332.b09-1.el9_0.ppc64le.rpm s390x: java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.s390x.rpm java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.s390x.rpm java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.s390x.rpm java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el9_0.s390x.rpm java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.s390x.rpm java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el9_0.s390x.rpm java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.s390x.rpm java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el9_0.s390x.rpm java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.s390x.rpm java-1.8.0-openjdk-src-1.8.0.332.b09-1.el9_0.s390x.rpm x86_64: java-1.8.0-openjdk-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-demo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-demo-fastdebug-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-devel-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-devel-fastdebug-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-fastdebug-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-headless-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-headless-fastdebug-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-src-1.8.0.332.b09-1.el9_0.x86_64.rpm Red Hat CodeReady Linux Builder (v. 9): aarch64: java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-demo-fastdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-demo-fastdebug-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-demo-slowdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-devel-fastdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-devel-fastdebug-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-devel-slowdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-fastdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-fastdebug-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-headless-fastdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-headless-fastdebug-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-headless-slowdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-slowdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-src-fastdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm java-1.8.0-openjdk-src-slowdebug-1.8.0.332.b09-1.el9_0.aarch64.rpm ppc64le: java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-demo-fastdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-demo-fastdebug-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-demo-slowdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-devel-fastdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-devel-fastdebug-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-devel-slowdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-fastdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-fastdebug-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-headless-fastdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-headless-fastdebug-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-headless-slowdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-slowdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-src-fastdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm java-1.8.0-openjdk-src-slowdebug-1.8.0.332.b09-1.el9_0.ppc64le.rpm x86_64: java-1.8.0-openjdk-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-debugsource-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-demo-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-demo-fastdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-demo-fastdebug-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-demo-slowdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-demo-slowdebug-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-devel-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-devel-fastdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-devel-fastdebug-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-devel-slowdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-devel-slowdebug-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-fastdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-fastdebug-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-headless-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-headless-fastdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-headless-fastdebug-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-headless-slowdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-headless-slowdebug-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-slowdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-slowdebug-debuginfo-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-src-fastdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm java-1.8.0-openjdk-src-slowdebug-1.8.0.332.b09-1.el9_0.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2022-21426 https://access.redhat.com/security/cve/CVE-2022-21434 https://access.redhat.com/security/cve/CVE-2022-21443 https://access.redhat.com/security/cve/CVE-2022-21476 https://access.redhat.com/security/cve/CVE-2022-21496 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYpn+ltzjgjWX9erEAQiJqBAAhLJxcSr28fL1Ob1ydp995JImoSLrd79m 6pAP+1cmWkok9p7GORpLUaIadDftEk3juSm4poPAQ0eKE+dFzJWB+XHmOS0YvEab kc8v+LZqTrKpkLup3opMOtFQdW/y7gkaLccu9ww9bpjkwSGd8e5cMx0pp3TiY0vf VzLaB0xY6UrqaU5HrRTJYtKTO/ftzYlia+KQEg4JPMO00c6d8iPOj7a3KSRuYPtb gVqmrFTSPh4ES67hg03KEQcsn6/Sst0nM6ne0VhPYcU5hLCMowrOlqqHhm3qfbAm +XctTiYcMZpbcWdWeIoou4AaGJ76yoHGS74iCBBACD3EZnI4Rao5QbjFTlPPdSYb x070Gk+NoTjfg/Y2XMKJg/Fx6GZb8yShu9r6RBnqFA6em+r4sR09IHVGCM6HIuz0 g+uOiVZJ0G+LKk3W2O0CgJlEX9eJOxBYtmp+PUfzwDvs6/9LwtRGGMZ1oCyijd4e jNmKBMEVk7GyVI279Mhe58t2EJyGbwXzLTR4myP/vjGWT2u5e3Nf09BRWux6e+Bv 6JpraVXbqaMBylCHj5rVO1PbzBsDN0JgWTaCqh7C2QQs9fSvvnem28Z+7OWvneYq bN46Scujx6ueXc3UaLNj6wFO0bmp7LIr4S9wFFS0k0VO8ZdIhM1a01a4wcTjcbeE 62Hnl63pgPY= =Mfpt -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . 8.1) - aarch64, ppc64le, s390x, x86_64 3. For further information, refer to the release notes linked to in the References section. This update rectifies this situation and again uses the database provided in the JDK bundle. Users may also now configure the cacerts database in the java.security file using the property security.systemCACerts. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. See the following advisory for the RPM packages for this release: https://access.redhat.com/errata/RHSA-2022:2280 Space precludes documenting all of the container images in this advisory. Solution: For OpenShift Container Platform 3.11 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/3.11/upgrading/index.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2076211 - CVE-2022-1677 openshift/router: route hijacking attack via crafted HAProxy configuration file 2086938 - Placeholder bug for OCP 3.11.z image release 5. Summary: Security updated rh-sso-7/sso75-openshift-rhel8 container image is now available for RHEL-8 based Middleware Containers. Description: The rh-sso-7/sso75-openshift-rhel8 container image has been updated for RHEL-8 based Middleware Containers to include the following security issues. Users of rh-sso-7/sso75-openshift-rhel8 container images are advised to upgrade to these updated images, which contain backported patches to correct these security issues, fix these bugs and add these enhancements. Users of these images are also encouraged to rebuild all container images that depend on these images. You can find images updated by this advisory in Red Hat Container Catalog (see References). Solution: The RHEL-8 based Middleware Containers container image provided by this update can be downloaded from the Red Hat Container Registry at registry.access.redhat.com. Dockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally. Bugs fixed (https://bugzilla.redhat.com/): 2071036 - CVE-2022-1245 keycloak: Privilege escalation vulnerability on Token Exchange 5

Trust: 1.8

sources: NVD: CVE-2022-21426 // VULHUB: VHN-407039 // PACKETSTORM: 166903 // PACKETSTORM: 166899 // PACKETSTORM: 166897 // PACKETSTORM: 167378 // PACKETSTORM: 166800 // PACKETSTORM: 166900 // PACKETSTORM: 166898 // PACKETSTORM: 167327 // PACKETSTORM: 166967

AFFECTED PRODUCTS

vendor:oraclemodel:jrescope:eqversion:18

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.8.0

Trust: 1.0

vendor:netappmodel:santricity unified managerscope:eqversion: -

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:17.32

Trust: 1.0

vendor:netappmodel:cloud insights acquisition unitscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:11.0.14

Trust: 1.0

vendor:netappmodel:solidfire\, enterprise sds \& hci storage nodescope:eqversion: -

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:17.0.2

Trust: 1.0

vendor:oraclemodel:graalvmscope:eqversion:22.0.0.2

Trust: 1.0

vendor:netappmodel:cloud secure agentscope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:11.0

Trust: 1.0

vendor:netappmodel:e-series santricity storage managerscope:eqversion: -

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:11.54

Trust: 1.0

vendor:netappmodel:7-mode transition toolscope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:netappmodel:solidfire \& hci management nodescope:eqversion: -

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:15.38

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:13.46

Trust: 1.0

vendor:netappmodel:active iq unified managerscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.7.0

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:18

Trust: 1.0

vendor:oraclemodel:graalvmscope:eqversion:20.3.5

Trust: 1.0

vendor:oraclemodel:graalvmscope:eqversion:21.3.1

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:lteversion:11.70.1

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:6.45

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:11.0.14

Trust: 1.0

vendor:netappmodel:e-series santricity web servicesscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.8.0

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:18.28

Trust: 1.0

vendor:netappmodel:oncommand insightscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.7.0

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:17.0.2

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:7.52

Trust: 1.0

vendor:netappmodel:hci compute nodescope:eqversion: -

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:gteversion:11.0.0

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:8.60

Trust: 1.0

sources: NVD: CVE-2022-21426

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-21426
value: MEDIUM

Trust: 1.0

secalert_us@oracle.com: CVE-2022-21426
value: MEDIUM

Trust: 1.0

VULHUB: VHN-407039
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2022-21426
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-407039
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

secalert_us@oracle.com: CVE-2022-21426
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-407039 // NVD: CVE-2022-21426 // NVD: CVE-2022-21426

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2022-21426

EXTERNAL IDS

db:NVDid:CVE-2022-21426

Trust: 2.0

db:PACKETSTORMid:167327

Trust: 0.2

db:PACKETSTORMid:167378

Trust: 0.2

db:PACKETSTORMid:166967

Trust: 0.2

db:PACKETSTORMid:167385

Trust: 0.1

db:PACKETSTORMid:167008

Trust: 0.1

db:PACKETSTORMid:167388

Trust: 0.1

db:PACKETSTORMid:167980

Trust: 0.1

db:PACKETSTORMid:167122

Trust: 0.1

db:PACKETSTORMid:167088

Trust: 0.1

db:PACKETSTORMid:167142

Trust: 0.1

db:PACKETSTORMid:167164

Trust: 0.1

db:PACKETSTORMid:167140

Trust: 0.1

db:PACKETSTORMid:167271

Trust: 0.1

db:PACKETSTORMid:167979

Trust: 0.1

db:PACKETSTORMid:166954

Trust: 0.1

db:VULHUBid:VHN-407039

Trust: 0.1

db:PACKETSTORMid:166903

Trust: 0.1

db:PACKETSTORMid:166899

Trust: 0.1

db:PACKETSTORMid:166897

Trust: 0.1

db:PACKETSTORMid:166800

Trust: 0.1

db:PACKETSTORMid:166900

Trust: 0.1

db:PACKETSTORMid:166898

Trust: 0.1

sources: VULHUB: VHN-407039 // PACKETSTORM: 166903 // PACKETSTORM: 166899 // PACKETSTORM: 166897 // PACKETSTORM: 167378 // PACKETSTORM: 166800 // PACKETSTORM: 166900 // PACKETSTORM: 166898 // PACKETSTORM: 167327 // PACKETSTORM: 166967 // NVD: CVE-2022-21426

REFERENCES

url:https://security.netapp.com/advisory/ntap-20220429-0006/

Trust: 1.1

url:https://www.debian.org/security/2022/dsa-5128

Trust: 1.1

url:https://www.debian.org/security/2022/dsa-5131

Trust: 1.1

url:https://www.oracle.com/security-alerts/cpuapr2022.html

Trust: 1.1

url:https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html

Trust: 1.1

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2022-21426

Trust: 0.9

url:https://access.redhat.com/security/cve/cve-2022-21426

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2022-21443

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2022-21434

Trust: 0.9

url:https://access.redhat.com/security/cve/cve-2022-21476

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2022-21476

Trust: 0.9

url:https://access.redhat.com/security/team/contact/

Trust: 0.9

url:https://access.redhat.com/security/cve/cve-2022-21443

Trust: 0.9

url:https://access.redhat.com/security/cve/cve-2022-21496

Trust: 0.9

url:https://access.redhat.com/security/cve/cve-2022-21434

Trust: 0.9

url:https://bugzilla.redhat.com/):

Trust: 0.9

url:https://nvd.nist.gov/vuln/detail/cve-2022-21496

Trust: 0.9

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.7

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-1271

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-25032

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-25032

Trust: 0.2

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1271

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-1245

Trust: 0.2

url:https://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_windows/index

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1492

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1439

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_for_windows/index

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1435

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/openjdk/11/html/installing_and_using_openjdk_11_on_rhel/installing-openjdk11-on-rhel8#installing-jdk11-on-rhel-using-archive_openjdk

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:2137

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1444

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21449

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/openjdk/17/html/installing_and_using_openjdk_17_for_windows/index

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21449

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1437

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1438

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/openjdk/8/html/installing_and_using_openjdk_8_for_rhel/assembly_installing-openjdk-8-on-red-hat-enterprise-linux_openjdk#installing-jdk11-on-rhel-using-archive_openjdk

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-29046

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-29599

Trust: 0.1

url:https://docs.openshift.com/container-platform/3.11/release_notes/ocp-3-11-release-notes.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-29046

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-29599

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1677

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21698

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:2281

Trust: 0.1

url:https://docs.openshift.com/container-platform/3.11/upgrading/index.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1677

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:2280

Trust: 0.1

url:https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21698

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-29036

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-29036

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1154

Trust: 0.1

url:https://access.redhat.com/containers/?tab=images#/registry.access.redhat.com/rh-sso-7/sso75-openshift-rhel8

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1245

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1154

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.5/html/release_notes/index

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1713

Trust: 0.1

sources: VULHUB: VHN-407039 // PACKETSTORM: 166903 // PACKETSTORM: 166899 // PACKETSTORM: 166897 // PACKETSTORM: 167378 // PACKETSTORM: 166800 // PACKETSTORM: 166900 // PACKETSTORM: 166898 // PACKETSTORM: 167327 // PACKETSTORM: 166967 // NVD: CVE-2022-21426

CREDITS

Red Hat

Trust: 0.9

sources: PACKETSTORM: 166903 // PACKETSTORM: 166899 // PACKETSTORM: 166897 // PACKETSTORM: 167378 // PACKETSTORM: 166800 // PACKETSTORM: 166900 // PACKETSTORM: 166898 // PACKETSTORM: 167327 // PACKETSTORM: 166967

SOURCES

db:VULHUBid:VHN-407039
db:PACKETSTORMid:166903
db:PACKETSTORMid:166899
db:PACKETSTORMid:166897
db:PACKETSTORMid:167378
db:PACKETSTORMid:166800
db:PACKETSTORMid:166900
db:PACKETSTORMid:166898
db:PACKETSTORMid:167327
db:PACKETSTORMid:166967
db:NVDid:CVE-2022-21426

LAST UPDATE DATE

2026-02-05T13:48:17.905000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-407039date:2022-07-28T00:00:00
db:NVDid:CVE-2022-21426date:2024-11-21T06:44:40.450

SOURCES RELEASE DATE

db:VULHUBid:VHN-407039date:2022-04-19T00:00:00
db:PACKETSTORMid:166903date:2022-04-29T12:37:12
db:PACKETSTORMid:166899date:2022-04-29T12:36:31
db:PACKETSTORMid:166897date:2022-04-29T12:36:03
db:PACKETSTORMid:167378date:2022-06-03T15:37:50
db:PACKETSTORMid:166800date:2022-04-21T15:09:24
db:PACKETSTORMid:166900date:2022-04-29T12:36:41
db:PACKETSTORMid:166898date:2022-04-29T12:36:12
db:PACKETSTORMid:167327date:2022-05-31T17:24:16
db:PACKETSTORMid:166967date:2022-05-05T17:31:42
db:NVDid:CVE-2022-21426date:2022-04-19T21:15:15.157