Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.884197
Categoría:CentOS Local Security Checks
Título:CentOS: Security Advisory for java (CESA-2022:0306)
Resumen:The remote host is missing an update for the 'java'; package(s) announced via the CESA-2022:0306 advisory.
Descripción:Summary:
The remote host is missing an update for the 'java'
package(s) announced via the CESA-2022:0306 advisory.

Vulnerability Insight:
The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime
Environment and the OpenJDK 8 Java Software Development Kit.

Security Fix(es):

* OpenJDK: Incomplete deserialization class filtering in ObjectInputStream
(Serialization, 8264934) (CVE-2022-21248)

* OpenJDK: Insufficient URI checks in the XSLT TransformerImpl (JAXP,
8270492) (CVE-2022-21282)

* OpenJDK: Unexpected exception thrown in regex Pattern (Libraries,
8268813) (CVE-2022-21283)

* OpenJDK: Incomplete checks of StringBuffer and StringBuilder during
deserialization (Libraries, 8270392) (CVE-2022-21293)

* OpenJDK: Incorrect IdentityHashMap size checks during deserialization
(Libraries, 8270416) (CVE-2022-21294)

* OpenJDK: Incorrect access checks in XMLEntityManager (JAXP, 8270498)
(CVE-2022-21296)

* OpenJDK: Infinite loop related to incorrect handling of newlines in
XMLEntityScanner (JAXP, 8270646) (CVE-2022-21299)

* OpenJDK: Array indexing issues in LIRGenerator (Hotspot, 8272014)
(CVE-2022-21305)

* OpenJDK: Excessive resource use when reading JAR manifest attributes
(Libraries, 8272026) (CVE-2022-21340)

* OpenJDK: Insufficient checks when deserializing exceptions in
ObjectInputStream (Serialization, 8272236) (CVE-2022-21341)

* OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8273756)
(CVE-2022-21360)

* OpenJDK: Integer overflow in BMPImageReader (ImageIO, 8273838)
(CVE-2022-21365)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Affected Software/OS:
'java' package(s) on CentOS 7.

Solution:
Please install the updated package(s).

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2022-21248
DSA-5057
https://www.debian.org/security/2022/dsa-5057
DSA-5058
https://www.debian.org/security/2022/dsa-5058
FEDORA-2022-416be040a8
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4J2N4FNXW6JKJBWUZH6SNI2UHCZXQXCY/
FEDORA-2022-477401b0f7
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2DIN3L6L3SVZK75CKW2GPSU4HIGZR7XG/
FEDORA-2022-b706eef225
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KPIWQ6DL5IPOT54UBWTISG5T24FQJ7MN/
GLSA-202209-05
https://security.gentoo.org/glsa/202209-05
[debian-lts-announce] 20220210 [SECURITY] [DLA 2917-1] openjdk-8 security update
https://lists.debian.org/debian-lts-announce/2022/02/msg00011.html
https://security.netapp.com/advisory/ntap-20220121-0007/
https://www.oracle.com/security-alerts/cpujan2022.html
Common Vulnerability Exposure (CVE) ID: CVE-2022-21282
Common Vulnerability Exposure (CVE) ID: CVE-2022-21283
Common Vulnerability Exposure (CVE) ID: CVE-2022-21293
Common Vulnerability Exposure (CVE) ID: CVE-2022-21294
Common Vulnerability Exposure (CVE) ID: CVE-2022-21296
Common Vulnerability Exposure (CVE) ID: CVE-2022-21299
Common Vulnerability Exposure (CVE) ID: CVE-2022-21305
Common Vulnerability Exposure (CVE) ID: CVE-2022-21340
Common Vulnerability Exposure (CVE) ID: CVE-2022-21341
Common Vulnerability Exposure (CVE) ID: CVE-2022-21360
Common Vulnerability Exposure (CVE) ID: CVE-2022-21365
CopyrightCopyright (C) 2022 Greenbone Networks GmbH

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.