{
  "schema_version": "1.7.0",
  "id": "RHSA-2026:9682",
  "related": [],
  "upstream": [
    "CVE-2026-22007",
    "CVE-2026-22013",
    "CVE-2026-22016",
    "CVE-2026-22018",
    "CVE-2026-22021",
    "CVE-2026-23865",
    "CVE-2026-34268"
  ],
  "published": "2026-04-23T10:15:33Z",
  "modified": "2026-04-25T10:09:50Z",
  "summary": "Red Hat Security Advisory: java-1.8.0-openjdk security update",
  "severity": [
    {
      "type": "CVSS_V3",
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
    }
  ],
  "affected": [
    {
      "package": {
        "name": "java-1.8.0-openjdk",
        "ecosystem": "Red Hat:rhel_els:7",
        "purl": "pkg:rpm/redhat/java-1.8.0-openjdk"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "1:1.8.0.492.b09-1.el7_9"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "java-1.8.0-openjdk-accessibility",
        "ecosystem": "Red Hat:rhel_els:7",
        "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-accessibility"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "1:1.8.0.492.b09-1.el7_9"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "java-1.8.0-openjdk-debuginfo",
        "ecosystem": "Red Hat:rhel_els:7",
        "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-debuginfo"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "1:1.8.0.492.b09-1.el7_9"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "java-1.8.0-openjdk-demo",
        "ecosystem": "Red Hat:rhel_els:7",
        "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-demo"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "1:1.8.0.492.b09-1.el7_9"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "java-1.8.0-openjdk-devel",
        "ecosystem": "Red Hat:rhel_els:7",
        "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-devel"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "1:1.8.0.492.b09-1.el7_9"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "java-1.8.0-openjdk-headless",
        "ecosystem": "Red Hat:rhel_els:7",
        "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-headless"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "1:1.8.0.492.b09-1.el7_9"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "java-1.8.0-openjdk-javadoc",
        "ecosystem": "Red Hat:rhel_els:7",
        "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "1:1.8.0.492.b09-1.el7_9"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "java-1.8.0-openjdk-javadoc-zip",
        "ecosystem": "Red Hat:rhel_els:7",
        "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-javadoc-zip"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "1:1.8.0.492.b09-1.el7_9"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    },
    {
      "package": {
        "name": "java-1.8.0-openjdk-src",
        "ecosystem": "Red Hat:rhel_els:7",
        "purl": "pkg:rpm/redhat/java-1.8.0-openjdk-src"
      },
      "ranges": [
        {
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "1:1.8.0.492.b09-1.el7_9"
            }
          ],
          "type": "ECOSYSTEM"
        }
      ]
    }
  ],
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://access.redhat.com/errata/RHSA-2026:9682"
    },
    {
      "type": "ARTICLE",
      "url": "https://access.redhat.com/security/updates/classification/#important"
    },
    {
      "type": "ADVISORY",
      "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_9682.json"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-22007"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460038"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-22007"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22007"
    },
    {
      "type": "ARTICLE",
      "url": "https://www.oracle.com/security-alerts/cpuapr2026.html#AppendixJAVA"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-22013"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460040"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-22013"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22013"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-22016"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460039"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-22016"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22016"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-22018"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460041"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-22018"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22018"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-22021"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460042"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-22021"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22021"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-23865"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2443891"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-23865"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23865"
    },
    {
      "type": "ARTICLE",
      "url": "https://gitlab.com/freetype/freetype/-/commit/fc85a255849229c024c8e65f536fe1875d84841c"
    },
    {
      "type": "ARTICLE",
      "url": "https://sourceforge.net/projects/freetype/files/freetype2/2.14.2/"
    },
    {
      "type": "ARTICLE",
      "url": "https://www.facebook.com/security/advisories/cve-2026-23865"
    },
    {
      "type": "REPORT",
      "url": "https://access.redhat.com/security/cve/CVE-2026-34268"
    },
    {
      "type": "REPORT",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2460043"
    },
    {
      "type": "ADVISORY",
      "url": "https://www.cve.org/CVERecord?id=CVE-2026-34268"
    },
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-34268"
    }
  ]
}