{"id":"RHSA-2022:0305","summary":"Red Hat Security Advisory: java-1.8.0-openjdk security update","modified":"2026-03-11T07:20:37.423580Z","published":"2024-09-16T06:49:59Z","upstream":["CVE-2022-21248","CVE-2022-21282","CVE-2022-21283","CVE-2022-21293","CVE-2022-21294","CVE-2022-21296","CVE-2022-21299","CVE-2022-21305","CVE-2022-21340","CVE-2022-21341","CVE-2022-21360","CVE-2022-21365"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2022:0305"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#moderate"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041400"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041417"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041427"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041435"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041439"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041472"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041491"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041785"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041801"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041878"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041884"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2041897"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_0305.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21248"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21248"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21248"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21282"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21282"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21282"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21283"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21283"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21283"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21293"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21293"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21293"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21294"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21294"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21294"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21296"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21296"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21296"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21299"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21299"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21299"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21305"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21305"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21305"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21340"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21340"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21340"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21341"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21341"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21341"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21360"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21360"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21360"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-21365"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-21365"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-21365"}],"affected":[{"package":{"name":"java-1.8.0-openjdk","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/java-1.8.0-openjdk"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.8.0.322.b06-1.el8_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0305.json"}},{"package":{"name":"java-1.8.0-openjdk-accessibility","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/java-1.8.0-openjdk-accessibility"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.8.0.322.b06-1.el8_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0305.json"}},{"package":{"name":"java-1.8.0-openjdk-debuginfo","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.8.0.322.b06-1.el8_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0305.json"}},{"package":{"name":"java-1.8.0-openjdk-debugsource","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/java-1.8.0-openjdk-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.8.0.322.b06-1.el8_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0305.json"}},{"package":{"name":"java-1.8.0-openjdk-demo","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/java-1.8.0-openjdk-demo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.8.0.322.b06-1.el8_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0305.json"}},{"package":{"name":"java-1.8.0-openjdk-demo-debuginfo","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/java-1.8.0-openjdk-demo-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.8.0.322.b06-1.el8_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0305.json"}},{"package":{"name":"java-1.8.0-openjdk-demo-slowdebug-debuginfo","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/java-1.8.0-openjdk-demo-slowdebug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.8.0.322.b06-1.el8_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0305.json"}},{"package":{"name":"java-1.8.0-openjdk-devel","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/java-1.8.0-openjdk-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.8.0.322.b06-1.el8_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0305.json"}},{"package":{"name":"java-1.8.0-openjdk-devel-debuginfo","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/java-1.8.0-openjdk-devel-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.8.0.322.b06-1.el8_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0305.json"}},{"package":{"name":"java-1.8.0-openjdk-devel-slowdebug-debuginfo","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/java-1.8.0-openjdk-devel-slowdebug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.8.0.322.b06-1.el8_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0305.json"}},{"package":{"name":"java-1.8.0-openjdk-headless","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/java-1.8.0-openjdk-headless"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.8.0.322.b06-1.el8_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0305.json"}},{"package":{"name":"java-1.8.0-openjdk-headless-debuginfo","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/java-1.8.0-openjdk-headless-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.8.0.322.b06-1.el8_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0305.json"}},{"package":{"name":"java-1.8.0-openjdk-headless-slowdebug-debuginfo","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/java-1.8.0-openjdk-headless-slowdebug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.8.0.322.b06-1.el8_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0305.json"}},{"package":{"name":"java-1.8.0-openjdk-javadoc","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/java-1.8.0-openjdk-javadoc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.8.0.322.b06-1.el8_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0305.json"}},{"package":{"name":"java-1.8.0-openjdk-javadoc-zip","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/java-1.8.0-openjdk-javadoc-zip"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.8.0.322.b06-1.el8_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0305.json"}},{"package":{"name":"java-1.8.0-openjdk-slowdebug-debuginfo","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/java-1.8.0-openjdk-slowdebug-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.8.0.322.b06-1.el8_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0305.json"}},{"package":{"name":"java-1.8.0-openjdk-src","ecosystem":"Red Hat:rhel_eus:8.2::appstream","purl":"pkg:rpm/redhat/java-1.8.0-openjdk-src"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:1.8.0.322.b06-1.el8_2"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2022:0305.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L"}]}