ID

VAR-202204-0596


CVE

CVE-2022-21434


TITLE

Red Hat Security Advisory 2022-2218-01

Trust: 0.1

sources: PACKETSTORM: 167140

DESCRIPTION

Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Libraries). Supported versions that are affected are Oracle Java SE: 7u331, 8u321, 11.0.14, 17.0.2, 18; Oracle GraalVM Enterprise Edition: 20.3.5, 21.3.1 and 22.0.0.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.1 Base Score 5.3 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N). (CVE-2022-21443). Bugs fixed (https://bugzilla.redhat.com/): 2004133 - CVE-2021-37136 netty-codec: Bzip2Decoder doesn't allow setting size restrictions for decompressed data 2004135 - CVE-2021-37137 netty-codec: SnappyFrameDecoder doesn't restrict chunk length and may buffer skippable chunks in an unnecessary way 2031958 - CVE-2021-43797 netty: control chars in header names may lead to HTTP request smuggling 2045880 - CVE-2022-21698 prometheus/client_golang: Denial of service using InstrumentHandlerCounter 2058404 - CVE-2022-0759 kubeclient: kubeconfig parsing error can lead to MITM attacks 5. JIRA issues fixed (https://issues.jboss.org/): LOG-1972 - Getting message, "Prometheus could not scrape fluentd for more than 10m." LOG-2335 - [release-5.2] Events listing out of order in Kibana 6.8.1 LOG-2475 - http.max_header_size set to 128kb causes communication with elasticsearch to stop working LOG-2480 - EO shouldn't grant cluster-wide permission to system:serviceaccount:openshift-monitoring:prometheus-k8s when ES cluster is deployed. [openshift-logging 5.2] 6. 9) - aarch64, ppc64le, s390x, x86_64 3. Description: Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. All OpenShift Container Platform 4.7 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html 3. Solution: For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update: https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html Details on how to access this content are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2066837 - CVE-2022-24769 moby: Default inheritable capabilities for linux container should be empty 2081642 - Placeholder bug for OCP 4.7.0 extras release 5. ========================================================================= Ubuntu Security Notice USN-5546-2 August 04, 2022 openjdk-8 vulnerabilities ========================================================================= A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM Summary: Several security issues were fixed in OpenJDK 8. Software Description: - openjdk-8: Open Source Java implementation Details: USN-5546-1 fixed vulnerabilities in OpenJDK. This update provides the corresponding updates for Ubuntu 16.04 ESM. Original advisory details: Neil Madden discovered that OpenJDK did not properly verify ECDSA signatures. A remote attacker could possibly use this issue to insert, edit or obtain sensitive information. This issue only affected OpenJDK 17 and OpenJDK 18. (CVE-2022-21449) It was discovered that OpenJDK incorrectly limited memory when compiling a specially crafted XPath expression. An attacker could possibly use this issue to cause a denial of service. This issue was fixed in OpenJDK 8 and OpenJDK 18. USN-5388-1 and USN-5388-2 addressed this issue in OpenJDK 11 and OpenJDK 17. (CVE-2022-21426) It was discovered that OpenJDK incorrectly handled converting certain object arguments into their textual representations. An attacker could possibly use this issue to cause a denial of service. This issue was fixed in OpenJDK 8 and OpenJDK 18. USN-5388-1 and USN-5388-2 addressed this issue in OpenJDK 11 and OpenJDK 17. (CVE-2022-21434) It was discovered that OpenJDK incorrectly validated the encoded length of certain object identifiers. An attacker could possibly use this issue to cause a denial of service. This issue was fixed in OpenJDK 8 and OpenJDK 18. USN-5388-1 and USN-5388-2 addressed this issue in OpenJDK 11 and OpenJDK 17. (CVE-2022-21443) It was discovered that OpenJDK incorrectly validated certain paths. An attacker could possibly use this issue to bypass the secure validation feature and expose sensitive information in XML files. This issue was fixed in OpenJDK 8 and OpenJDK 18. USN-5388-1 and USN-5388-2 addressed this issue in OpenJDK 11 and OpenJDK 17. (CVE-2022-21476) It was discovered that OpenJDK incorrectly parsed certain URI strings. An attacker could possibly use this issue to make applications accept invalid of malformed URI strings. This issue was fixed in OpenJDK 8 and OpenJDK 18. USN-5388-1 and USN-5388-2 addressed this issue in OpenJDK 11 and OpenJDK 17. (CVE-2022-21496) It was discovered that OpenJDK incorrectly generated class code in the Hotspot component. An attacker could possibly use this issue to obtain sensitive information. (CVE-2022-21540) It was dicovered that OpenJDK incorrectly restricted access to the invokeBasic() method in the Hotspot component. An attacker could possibly use this issue to insert, edit or obtain sensitive information. (CVE-2022-21541) It was discovered that OpenJDK incorrectly computed exponentials. An attacker could possibly use this issue to insert, edit or obtain sensitive information. This issue only affected OpenJDK 17. (CVE-2022-21549) It was discovered that OpenJDK includes a copy of Xalan that incorrectly handled integer truncation. An attacker could possibly use this issue to execute arbitrary code. (CVE-2022-34169) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: openjdk-8-jdk 8u342-b07-0ubuntu1~16.04 openjdk-8-jre 8u342-b07-0ubuntu1~16.04 openjdk-8-jre-headless 8u342-b07-0ubuntu1~16.04 openjdk-8-jre-zero 8u342-b07-0ubuntu1~16.04 This update uses a new upstream release, which includes additional bug fixes. After a standard system update you need to restart any Java applications or applets to make all the necessary changes. References: https://ubuntu.com/security/notices/USN-5546-2 https://ubuntu.com/security/notices/USN-5546-1 CVE-2022-21426, CVE-2022-21434, CVE-2022-21443, CVE-2022-21476, CVE-2022-21496, CVE-2022-21540, CVE-2022-21541, CVE-2022-34169 . -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: java-1.8.0-ibm security update Advisory ID: RHSA-2022:4959-01 Product: Red Hat Enterprise Linux Supplementary Advisory URL: https://access.redhat.com/errata/RHSA-2022:4959 Issue date: 2022-06-08 CVE Names: CVE-2021-35561 CVE-2022-21434 CVE-2022-21443 CVE-2022-21496 ==================================================================== 1. Summary: An update for java-1.8.0-ibm is now available for Red Hat Enterprise Linux 7 Supplementary. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Supplementary (v. 7) - x86_64 Red Hat Enterprise Linux ComputeNode Supplementary (v. 7) - x86_64 Red Hat Enterprise Linux Server Supplementary (v. 7) - ppc64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux Workstation Supplementary (v. 7) - x86_64 3. Description: IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR7-FP10. Security Fix(es): * OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) (CVE-2021-35561) * OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) (CVE-2022-21434) * OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) (CVE-2022-21443) * OpenJDK: URI parsing inconsistencies (JNDI, 8278972) (CVE-2022-21496) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 All running instances of IBM Java must be restarted for this update to take effect. 5. Bugs fixed (https://bugzilla.redhat.com/): 2014524 - CVE-2021-35561 OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility, 8266097) 2075793 - CVE-2022-21443 OpenJDK: Missing check for negative ObjectIdentifier (Libraries, 8275151) 2075836 - CVE-2022-21434 OpenJDK: Improper object-to-string conversion in AnnotationInvocationHandler (Libraries, 8277672) 2075849 - CVE-2022-21496 OpenJDK: URI parsing inconsistencies (JNDI, 8278972) 6. Package List: Red Hat Enterprise Linux Client Supplementary (v. 7): x86_64: java-1.8.0-ibm-1.8.0.7.10-1jpp.1.el7.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.7.10-1jpp.1.el7.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.7.10-1jpp.1.el7.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.7.10-1jpp.1.el7.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.7.10-1jpp.1.el7.x86_64.rpm java-1.8.0-ibm-src-1.8.0.7.10-1jpp.1.el7.x86_64.rpm Red Hat Enterprise Linux ComputeNode Supplementary (v. 7): x86_64: java-1.8.0-ibm-1.8.0.7.10-1jpp.1.el7.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.7.10-1jpp.1.el7.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.7.10-1jpp.1.el7.x86_64.rpm java-1.8.0-ibm-src-1.8.0.7.10-1jpp.1.el7.x86_64.rpm Red Hat Enterprise Linux Server Supplementary (v. 7): ppc64: java-1.8.0-ibm-1.8.0.7.10-1jpp.1.el7.ppc64.rpm java-1.8.0-ibm-demo-1.8.0.7.10-1jpp.1.el7.ppc64.rpm java-1.8.0-ibm-devel-1.8.0.7.10-1jpp.1.el7.ppc64.rpm java-1.8.0-ibm-jdbc-1.8.0.7.10-1jpp.1.el7.ppc64.rpm java-1.8.0-ibm-plugin-1.8.0.7.10-1jpp.1.el7.ppc64.rpm java-1.8.0-ibm-src-1.8.0.7.10-1jpp.1.el7.ppc64.rpm ppc64le: java-1.8.0-ibm-1.8.0.7.10-1jpp.1.el7.ppc64le.rpm java-1.8.0-ibm-demo-1.8.0.7.10-1jpp.1.el7.ppc64le.rpm java-1.8.0-ibm-devel-1.8.0.7.10-1jpp.1.el7.ppc64le.rpm java-1.8.0-ibm-jdbc-1.8.0.7.10-1jpp.1.el7.ppc64le.rpm java-1.8.0-ibm-src-1.8.0.7.10-1jpp.1.el7.ppc64le.rpm s390x: java-1.8.0-ibm-1.8.0.7.10-1jpp.1.el7.s390x.rpm java-1.8.0-ibm-demo-1.8.0.7.10-1jpp.1.el7.s390x.rpm java-1.8.0-ibm-devel-1.8.0.7.10-1jpp.1.el7.s390x.rpm java-1.8.0-ibm-jdbc-1.8.0.7.10-1jpp.1.el7.s390x.rpm java-1.8.0-ibm-src-1.8.0.7.10-1jpp.1.el7.s390x.rpm x86_64: java-1.8.0-ibm-1.8.0.7.10-1jpp.1.el7.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.7.10-1jpp.1.el7.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.7.10-1jpp.1.el7.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.7.10-1jpp.1.el7.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.7.10-1jpp.1.el7.x86_64.rpm java-1.8.0-ibm-src-1.8.0.7.10-1jpp.1.el7.x86_64.rpm Red Hat Enterprise Linux Workstation Supplementary (v. 7): x86_64: java-1.8.0-ibm-1.8.0.7.10-1jpp.1.el7.x86_64.rpm java-1.8.0-ibm-demo-1.8.0.7.10-1jpp.1.el7.x86_64.rpm java-1.8.0-ibm-devel-1.8.0.7.10-1jpp.1.el7.x86_64.rpm java-1.8.0-ibm-jdbc-1.8.0.7.10-1jpp.1.el7.x86_64.rpm java-1.8.0-ibm-plugin-1.8.0.7.10-1jpp.1.el7.x86_64.rpm java-1.8.0-ibm-src-1.8.0.7.10-1jpp.1.el7.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIUAwUBYqFNjNzjgjWX9erEAQgiIA/1FWxZFUVh5VUuwfuL4q1F2+a34xaDFJRC BHEFyCQS6s4VTItl0+M+qSa/Hme2JXg0ro2UpkCN22Te3H65kc+OxvZY04IyAmsr vk2xFLb2O5NXNh6tFvJF0ldnQMCXTTvFUOXonvR3oWzmI2rYoVPu9Eoyk5IIK+// mP/RocS+E7k2DS1HrqU+n+7YEIjw8Ccta6yJN/nVLuvP6829vOCVPvDVVpxOeym4 MYUuCO1vVnYdeTqRtqm4bdUbnEV7Rj+3GwbPfhe0PTTCRPmRZBC8txy37vlr0xbq L1no/07RBuW1GJM1vqnrn7xd9kAGwd/CFfgAx6Id5naf/BnTY7NTnjA5bX9GT2Dv /EP9M2/QhU5HGAchGrHoDjPmYF41tdxnIzAQi7657TwrorVWlT5Nlzb03GSjsz7G uClP/asaRoCpmLXM/c+O9DE0wbMs21+lXR+1fXNqlDXQ4PbF1Dz2chFcpvc+aHNf 7hTf6U9TXKItrR3CX6go0BLONjUmcsvIMNzo/PwoEjXUOn4/hq1SsFPT8+L/oMKo sLkJnjYcW3MuhHjbmUsupskZyHEWvLF+lEfhim2Bb+7XQ77/dTnVeM1TF2pw4346 z3rgMQPDZDryudJUGFQ8lWG3VNsJBVeV0odh3M4fT3TuGpzhLwY8du6XdJfFLuKb p8Zit/zyDw==hqP8 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 1.71

sources: NVD: CVE-2022-21434 // VULHUB: VHN-407047 // VULMON: CVE-2022-21434 // PACKETSTORM: 167140 // PACKETSTORM: 167388 // PACKETSTORM: 167980 // PACKETSTORM: 167164 // PACKETSTORM: 167327 // PACKETSTORM: 167979 // PACKETSTORM: 167456

AFFECTED PRODUCTS

vendor:oraclemodel:jrescope:eqversion:18

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.8.0

Trust: 1.0

vendor:netappmodel:santricity unified managerscope:eqversion: -

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:17.32

Trust: 1.0

vendor:netappmodel:cloud insights acquisition unitscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:11.0.14

Trust: 1.0

vendor:netappmodel:solidfire\, enterprise sds \& hci storage nodescope:eqversion: -

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:17.0.2

Trust: 1.0

vendor:oraclemodel:graalvmscope:eqversion:22.0.0.2

Trust: 1.0

vendor:netappmodel:cloud secure agentscope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:11.0

Trust: 1.0

vendor:netappmodel:e-series santricity storage managerscope:eqversion: -

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:11.54

Trust: 1.0

vendor:netappmodel:7-mode transition toolscope:eqversion: -

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:netappmodel:solidfire \& hci management nodescope:eqversion: -

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:15.38

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:13.46

Trust: 1.0

vendor:netappmodel:active iq unified managerscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.7.0

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:18

Trust: 1.0

vendor:oraclemodel:graalvmscope:eqversion:20.3.5

Trust: 1.0

vendor:oraclemodel:graalvmscope:eqversion:21.3.1

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:lteversion:11.70.1

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:6.45

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:11.0.14

Trust: 1.0

vendor:netappmodel:e-series santricity web servicesscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:1.8.0

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:18.28

Trust: 1.0

vendor:netappmodel:oncommand insightscope:eqversion: -

Trust: 1.0

vendor:oraclemodel:jdkscope:eqversion:1.7.0

Trust: 1.0

vendor:oraclemodel:jrescope:eqversion:17.0.2

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:7.52

Trust: 1.0

vendor:netappmodel:hci compute nodescope:eqversion: -

Trust: 1.0

vendor:netappmodel:e-series santricity os controllerscope:gteversion:11.0.0

Trust: 1.0

vendor:azulmodel:zuluscope:eqversion:8.60

Trust: 1.0

sources: NVD: CVE-2022-21434

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-21434
value: MEDIUM

Trust: 1.0

secalert_us@oracle.com: CVE-2022-21434
value: MEDIUM

Trust: 1.0

VULHUB: VHN-407047
value: MEDIUM

Trust: 0.1

VULMON: CVE-2022-21434
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2022-21434
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

VULHUB: VHN-407047
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

secalert_us@oracle.com: CVE-2022-21434
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: LOW
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 1.0

sources: VULHUB: VHN-407047 // VULMON: CVE-2022-21434 // NVD: CVE-2022-21434 // NVD: CVE-2022-21434

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2022-21434

THREAT TYPE

remote

Trust: 0.2

sources: PACKETSTORM: 167980 // PACKETSTORM: 167979

PATCH

title:Arch Linux Issues: url:https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues&qid=CVE-2022-21434

Trust: 0.1

title:Ubuntu Security Notice: USN-5388-1: OpenJDK vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-5388-1

Trust: 0.1

title:Red Hat: Moderate: java-1.8.0-ibm security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225837 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: java-1.8.0-ibm security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20224959 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: USN-5388-2: OpenJDK vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-5388-2

Trust: 0.1

title:Red Hat: Important: java-1.8.0-openjdk security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221487 - Security Advisory

Trust: 0.1

title:Red Hat: Important: java-11-openjdk security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221442 - Security Advisory

Trust: 0.1

title:Red Hat: Important: java-11-openjdk security, bug fix, and enhancement updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221440 - Security Advisory

Trust: 0.1

title:Red Hat: Important: java-1.8.0-openjdk security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221488 - Security Advisory

Trust: 0.1

title:Red Hat: Important: OpenJDK 8u332 Windows builds release and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221492 - Security Advisory

Trust: 0.1

title:Red Hat: Important: java-11-openjdk security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221441 - Security Advisory

Trust: 0.1

title:Red Hat: Important: OpenJDK 11.0.15 security update for Portable Linux Buildsurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221435 - Security Advisory

Trust: 0.1

title:Red Hat: Important: java-11-openjdk security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221444 - Security Advisory

Trust: 0.1

title:Red Hat: Important: OpenJDK 11.0.15 security update for Windows Buildsurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221439 - Security Advisory

Trust: 0.1

title:Red Hat: Important: OpenJDK 8u332 security update for Portable Linux Buildsurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221438 - Security Advisory

Trust: 0.1

title:Red Hat: Important: java-1.8.0-openjdk security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221490 - Security Advisory

Trust: 0.1

title:Red Hat: Important: java-1.8.0-openjdk security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221491 - Security Advisory

Trust: 0.1

title:Red Hat: Important: java-1.8.0-openjdk security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221489 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: java-1.7.1-ibm security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20224957 - Security Advisory

Trust: 0.1

title:Red Hat: Important: java-11-openjdk security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221728 - Security Advisory

Trust: 0.1

title:Red Hat: Important: java-1.8.0-openjdk security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222137 - Security Advisory

Trust: 0.1

title:Red Hat: Important: java-11-openjdk security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221443 - Security Advisory

Trust: 0.1

title:Red Hat: Important: OpenJDK 17.0.3 security update for Windows Buildsurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221437 - Security Advisory

Trust: 0.1

title:Red Hat: Important: java-17-openjdk security and bug fix updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221445 - Security Advisory

Trust: 0.1

title:Red Hat: Important: OpenJDK 17.0.3 security update for Portable Linux Buildsurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221436 - Security Advisory

Trust: 0.1

title:Red Hat: Important: java-17-openjdk security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221729 - Security Advisory

Trust: 0.1

title:Debian Security Advisories: DSA-5131-1 openjdk-11 -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=5c8840c405cfcf2d530316add80d95b7

Trust: 0.1

title:Debian Security Advisories: DSA-5128-1 openjdk-17 -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=c35e0aa61b24f917b1354b5d6ba66425

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.8.41 bug fix and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222272 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Cryostat 2.1.0: new Cryostat on RHEL 8 container imagesurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221679 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: security update for rh-sso-7/sso75-openshift-rhel8 container imageurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221713 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.7.50 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221699 - Security Advisory

Trust: 0.1

title:Ubuntu Security Notice: USN-5546-2: OpenJDK 8 vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-5546-2

Trust: 0.1

title:Ubuntu Security Notice: USN-5546-1: OpenJDK vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-5546-1

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 3.11.705 security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222281 - Security Advisory

Trust: 0.1

title:Amazon Linux 2: ALAS2-2022-1791url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2022-1791

Trust: 0.1

title:Amazon Linux 2: ALAS2-2022-1790url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2022-1790

Trust: 0.1

title:Amazon Linux 2: ALAS2-2022-1778url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2022-1778

Trust: 0.1

title:Amazon Linux 2: ALAS2CORRETTO8-2022-002url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2CORRETTO8-2022-002

Trust: 0.1

title:Red Hat: Moderate: Red Hat OpenShift Logging Security and Bug update Release 5.4.1url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222216 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Openshift Logging Security and Bug update Release (5.2.10)url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222218 - Security Advisory

Trust: 0.1

title:Red Hat: Moderate: Red Hat OpenShift Logging Security and Bug update Release 5.3.7url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20222217 - Security Advisory

Trust: 0.1

title:Hitachi Security Advisories: Multiple Vulnerabilities in Hitachi Command Suite, Hitachi Automation Director, Hitachi Configuration Manager, Hitachi Infrastructure Analytics Advisor and Hitachi Ops Centerurl:https://vulmon.com/vendoradvisory?qidtp=hitachi_security_advisories&qid=hitachi-sec-2022-113

Trust: 0.1

title:Hitachi Security Advisories: Multiple Vulnerabilities in Cosminexusurl:https://vulmon.com/vendoradvisory?qidtp=hitachi_security_advisories&qid=hitachi-sec-2022-112

Trust: 0.1

title:Amazon Linux 2: ALAS2JAVA-OPENJDK11-2022-002url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2JAVA-OPENJDK11-2022-002

Trust: 0.1

title:Red Hat: Moderate: OpenShift Container Platform 4.6.57 security and extras updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221622 - Security Advisory

Trust: 0.1

title:Red Hat: Low: Release of OpenShift Serverless Version 1.22.0url:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221747 - Security Advisory

Trust: 0.1

title:Amazon Linux AMI: ALAS-2022-1633url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2022-1633

Trust: 0.1

title:Amazon Linux AMI: ALAS-2022-1631url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2022-1631

Trust: 0.1

title:Amazon Linux 2: ALAS2-2022-1835url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux2&qid=ALAS2-2022-1835

Trust: 0.1

title:CVE-2022-XXXXurl:https://github.com/AlphabugX/CVE-2022-23305

Trust: 0.1

title:CVE-2022-XXXXurl:https://github.com/AlphabugX/CVE-2022-RCE

Trust: 0.1

sources: VULMON: CVE-2022-21434

EXTERNAL IDS

db:NVDid:CVE-2022-21434

Trust: 1.9

db:PACKETSTORMid:167456

Trust: 0.2

db:PACKETSTORMid:167327

Trust: 0.2

db:PACKETSTORMid:167980

Trust: 0.2

db:PACKETSTORMid:167388

Trust: 0.2

db:PACKETSTORMid:167164

Trust: 0.2

db:PACKETSTORMid:167140

Trust: 0.2

db:PACKETSTORMid:167979

Trust: 0.2

db:PACKETSTORMid:167385

Trust: 0.1

db:PACKETSTORMid:167378

Trust: 0.1

db:PACKETSTORMid:167008

Trust: 0.1

db:PACKETSTORMid:166967

Trust: 0.1

db:PACKETSTORMid:167122

Trust: 0.1

db:PACKETSTORMid:167088

Trust: 0.1

db:PACKETSTORMid:167142

Trust: 0.1

db:PACKETSTORMid:167942

Trust: 0.1

db:PACKETSTORMid:167454

Trust: 0.1

db:PACKETSTORMid:167271

Trust: 0.1

db:PACKETSTORMid:166954

Trust: 0.1

db:VULHUBid:VHN-407047

Trust: 0.1

db:VULMONid:CVE-2022-21434

Trust: 0.1

sources: VULHUB: VHN-407047 // VULMON: CVE-2022-21434 // PACKETSTORM: 167140 // PACKETSTORM: 167388 // PACKETSTORM: 167980 // PACKETSTORM: 167164 // PACKETSTORM: 167327 // PACKETSTORM: 167979 // PACKETSTORM: 167456 // NVD: CVE-2022-21434

REFERENCES

url:https://security.netapp.com/advisory/ntap-20220429-0006/

Trust: 1.2

url:https://www.debian.org/security/2022/dsa-5128

Trust: 1.2

url:https://www.debian.org/security/2022/dsa-5131

Trust: 1.2

url:https://www.oracle.com/security-alerts/cpuapr2022.html

Trust: 1.2

url:https://lists.debian.org/debian-lts-announce/2022/05/msg00017.html

Trust: 1.2

url:https://security.netapp.com/advisory/ntap-20240621-0006/

Trust: 1.0

url:https://nvd.nist.gov/vuln/detail/cve-2022-21443

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2022-21496

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2022-21434

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2022-21426

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2022-21476

Trust: 0.6

url:https://access.redhat.com/security/team/contact/

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2022-21496

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2022-21443

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2022-21434

Trust: 0.5

url:https://bugzilla.redhat.com/):

Trust: 0.5

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2022-21426

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-21476

Trust: 0.4

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-21698

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-25636

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-25636

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2018-25032

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2018-25032

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21698

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-1271

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1271

Trust: 0.2

url:https://access.redhat.com/security/team/key/

Trust: 0.2

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://ubuntu.com/security/notices/usn-5546-1

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21540

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21449

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21541

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-34169

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-21549

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://security.archlinux.org/cve-2022-21434

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5388-1

Trust: 0.1

url:https://issues.jboss.org/):

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-43797

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0759

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1154

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-37137

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:2218

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1154

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-43797

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-37137

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.8/release_notes/ocp-4-8-release-notes.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-4028

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-37136

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0778

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4028

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-37136

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0778

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0759

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-upgrading.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1728

Trust: 0.1

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-8/8u342-b07-0ubuntu1~22.04

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-8/8u342-b07-0ubuntu1~20.04

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-17/17.0.4+8-1~18.04

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-17/17.0.4+8-1~22.04

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.16+8-0ubuntu1~20.04

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-18/18.0.2+9-2~22.04

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.16+8-0ubuntu1~22.04

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-17/17.0.4+8-1~20.04

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-8/8u342-b07-0ubuntu1~18.04

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/openjdk-lts/11.0.16+8-0ubuntu1~18.04

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0492

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-4083

Trust: 0.1

url:https://access.redhat.com/errata/rhba-2022:1698

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-4083

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24769

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-release-notes.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0492

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1699

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.7/updating/updating-cluster-cli.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-24769

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-29046

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-29599

Trust: 0.1

url:https://docs.openshift.com/container-platform/3.11/release_notes/ocp-3-11-release-notes.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-29046

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-29599

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-1677

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:2281

Trust: 0.1

url:https://docs.openshift.com/container-platform/3.11/upgrading/index.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1677

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:2280

Trust: 0.1

url:https://docs.openshift.com/container-platform/3.11/release_notes/ocp_3_11_release_notes.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-29036

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-29036

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5546-2

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-35561

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-35561

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:4959

Trust: 0.1

sources: VULHUB: VHN-407047 // VULMON: CVE-2022-21434 // PACKETSTORM: 167140 // PACKETSTORM: 167388 // PACKETSTORM: 167980 // PACKETSTORM: 167164 // PACKETSTORM: 167327 // PACKETSTORM: 167979 // PACKETSTORM: 167456 // NVD: CVE-2022-21434

CREDITS

Red Hat

Trust: 0.5

sources: PACKETSTORM: 167140 // PACKETSTORM: 167388 // PACKETSTORM: 167164 // PACKETSTORM: 167327 // PACKETSTORM: 167456

SOURCES

db:VULHUBid:VHN-407047
db:VULMONid:CVE-2022-21434
db:PACKETSTORMid:167140
db:PACKETSTORMid:167388
db:PACKETSTORMid:167980
db:PACKETSTORMid:167164
db:PACKETSTORMid:167327
db:PACKETSTORMid:167979
db:PACKETSTORMid:167456
db:NVDid:CVE-2022-21434

LAST UPDATE DATE

2025-06-27T19:36:25.862000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-407047date:2022-07-28T00:00:00
db:VULMONid:CVE-2022-21434date:2023-04-27T00:00:00
db:NVDid:CVE-2022-21434date:2024-11-21T06:44:41.427

SOURCES RELEASE DATE

db:VULHUBid:VHN-407047date:2022-04-19T00:00:00
db:VULMONid:CVE-2022-21434date:2022-04-19T00:00:00
db:PACKETSTORMid:167140date:2022-05-12T15:53:27
db:PACKETSTORMid:167388date:2022-06-03T15:59:53
db:PACKETSTORMid:167980date:2022-08-05T14:51:20
db:PACKETSTORMid:167164date:2022-05-13T16:05:21
db:PACKETSTORMid:167327date:2022-05-31T17:24:16
db:PACKETSTORMid:167979date:2022-08-05T14:51:13
db:PACKETSTORMid:167456date:2022-06-09T16:10:59
db:NVDid:CVE-2022-21434date:2022-04-19T21:15:15.387