It was discovered that the XMLEntityManager class implementation in the JAXP component of OpenJDK did not properly perform access checks. A Java application using SAX XML parser in certain configuration could be tricked into disclosing information when parsing a specially-crafted XML file.
Public now via Oracle CPU January 2022: https://www.oracle.com/security-alerts/cpujan2022.html#AppendixJAVA Fixed in Oracle Java SE 17.0.2, 11.0.14, 8u321, and 7u331.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:0161 https://access.redhat.com/errata/RHSA-2022:0161
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2022:0233 https://access.redhat.com/errata/RHSA-2022:0233
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2022:0209 https://access.redhat.com/errata/RHSA-2022:0209
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:0185 https://access.redhat.com/errata/RHSA-2022:0185
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:0211 https://access.redhat.com/errata/RHSA-2022:0211
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2022:0204 https://access.redhat.com/errata/RHSA-2022:0204
This issue has been addressed in the following products: Red Hat Build of OpenJDK 17.0.2 Via RHSA-2022:0166 https://access.redhat.com/errata/RHSA-2022:0166
This issue has been addressed in the following products: Red Hat Build of OpenJDK 17.0.2 Via RHSA-2022:0165 https://access.redhat.com/errata/RHSA-2022:0165
This issue has been addressed in the following products: Red Hat Build of OpenJDK 11.0.14 Via RHSA-2022:0228 https://access.redhat.com/errata/RHSA-2022:0228
This issue has been addressed in the following products: Red Hat Build of OpenJDK 11.0.14 Via RHSA-2022:0229 https://access.redhat.com/errata/RHSA-2022:0229
OpenJDK-17 upstream commit: https://github.com/openjdk/jdk17u/commit/f7f9a73a1e73576fd276fdc2a6305c136a2dde52 OpenJDK-11 upstream commit: https://github.com/openjdk/jdk11u-dev/commit/55e5e04e8722cad921d1bef92ad6391486771dd2 OpenJDK-8 upstream commit: http://hg.openjdk.java.net/jdk8u/monojdk8u/rev/76e7ac8ee6dd
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions Via RHSA-2022:0304 https://access.redhat.com/errata/RHSA-2022:0304
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Extended Update Support Via RHSA-2022:0305 https://access.redhat.com/errata/RHSA-2022:0305
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2022:0307 https://access.redhat.com/errata/RHSA-2022:0307
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2022:0306 https://access.redhat.com/errata/RHSA-2022:0306
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Extended Update Support Via RHSA-2022:0312 https://access.redhat.com/errata/RHSA-2022:0312
This issue has been addressed in the following products: Red Hat Build of OpenJDK 8u322 Via RHSA-2022:0321 https://access.redhat.com/errata/RHSA-2022:0321
This issue has been addressed in the following products: Red Hat Build of OpenJDK 8u322 Via RHSA-2022:0317 https://access.redhat.com/errata/RHSA-2022:0317
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-21296