First published: Wed Jan 19 2022(Updated: )
An unspecified vulnerability in Java SE related to the 2D component could allow an unauthenticated attacker to cause a denial of service resulting in a low availability impact using unknown attack vectors.
Credit: secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM InfoSphere Guardium z/OS | <=10.5 | |
IBM InfoSphere Guardium z/OS | <=10.6 | |
IBM InfoSphere Guardium z/OS | <=11.0 | |
IBM InfoSphere Guardium z/OS | <=11.1 | |
IBM InfoSphere Guardium z/OS | <=11.3 | |
IBM InfoSphere Guardium z/OS | <=11.2 | |
IBM InfoSphere Guardium z/OS | <=11.4 | |
Oracle GraalVM Enterprise Edition | =20.3.4 | |
Oracle GraalVM Enterprise Edition | =21.3.0 | |
Oracle JDK 6 | =1.7.0-update321 | |
Oracle JDK 6 | =1.8.0-update311 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update321 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update311 | |
NetApp 7-Mode Transition Tool | ||
netapp cloud insights | ||
NetApp E-Series SANtricity OS Controller | >=11.0.0<=11.70.1 | |
netapp e-series santricity storage manager | ||
netapp e-series santricity Web services Web services proxy | ||
netapp hci management node | ||
NetApp OnCommand Insight | ||
NetApp OnCommand Workflow Automation | ||
netapp santricity unified manager | ||
netapp snapmanager Oracle | ||
netapp snapmanager sap | ||
netapp solidfire | ||
Debian | =9.0 | |
OpenJDK 17 | =7 | |
OpenJDK 17 | =7-update1 | |
OpenJDK 17 | =7-update10 | |
OpenJDK 17 | =7-update101 | |
OpenJDK 17 | =7-update11 | |
OpenJDK 17 | =7-update111 | |
OpenJDK 17 | =7-update121 | |
OpenJDK 17 | =7-update13 | |
OpenJDK 17 | =7-update131 | |
OpenJDK 17 | =7-update141 | |
OpenJDK 17 | =7-update15 | |
OpenJDK 17 | =7-update151 | |
OpenJDK 17 | =7-update161 | |
OpenJDK 17 | =7-update17 | |
OpenJDK 17 | =7-update171 | |
OpenJDK 17 | =7-update181 | |
OpenJDK 17 | =7-update191 | |
OpenJDK 17 | =7-update2 | |
OpenJDK 17 | =7-update201 | |
OpenJDK 17 | =7-update21 | |
OpenJDK 17 | =7-update211 | |
OpenJDK 17 | =7-update221 | |
OpenJDK 17 | =7-update231 | |
OpenJDK 17 | =7-update241 | |
OpenJDK 17 | =7-update25 | |
OpenJDK 17 | =7-update251 | |
OpenJDK 17 | =7-update261 | |
OpenJDK 17 | =7-update271 | |
OpenJDK 17 | =7-update281 | |
OpenJDK 17 | =7-update291 | |
OpenJDK 17 | =7-update3 | |
OpenJDK 17 | =7-update301 | |
OpenJDK 17 | =7-update311 | |
OpenJDK 17 | =7-update321 | |
OpenJDK 17 | =7-update4 | |
OpenJDK 17 | =7-update40 | |
OpenJDK 17 | =7-update45 | |
OpenJDK 17 | =7-update5 | |
OpenJDK 17 | =7-update51 | |
OpenJDK 17 | =7-update55 | |
OpenJDK 17 | =7-update6 | |
OpenJDK 17 | =7-update60 | |
OpenJDK 17 | =7-update65 | |
OpenJDK 17 | =7-update67 | |
OpenJDK 17 | =7-update7 | |
OpenJDK 17 | =7-update72 | |
OpenJDK 17 | =7-update76 | |
OpenJDK 17 | =7-update80 | |
OpenJDK 17 | =7-update85 | |
OpenJDK 17 | =7-update9 | |
OpenJDK 17 | =7-update91 | |
OpenJDK 17 | =7-update95 | |
OpenJDK 17 | =7-update97 | |
OpenJDK 17 | =7-update99 | |
OpenJDK 17 | =8 | |
OpenJDK 17 | =8-milestone1 | |
OpenJDK 17 | =8-milestone2 | |
OpenJDK 17 | =8-milestone3 | |
OpenJDK 17 | =8-milestone4 | |
OpenJDK 17 | =8-milestone5 | |
OpenJDK 17 | =8-milestone6 | |
OpenJDK 17 | =8-milestone7 | |
OpenJDK 17 | =8-milestone8 | |
OpenJDK 17 | =8-milestone9 | |
OpenJDK 17 | =8-update101 | |
OpenJDK 17 | =8-update102 | |
OpenJDK 17 | =8-update11 | |
OpenJDK 17 | =8-update111 | |
OpenJDK 17 | =8-update112 | |
OpenJDK 17 | =8-update121 | |
OpenJDK 17 | =8-update131 | |
OpenJDK 17 | =8-update141 | |
OpenJDK 17 | =8-update151 | |
OpenJDK 17 | =8-update152 | |
OpenJDK 17 | =8-update161 | |
OpenJDK 17 | =8-update162 | |
OpenJDK 17 | =8-update171 | |
OpenJDK 17 | =8-update172 | |
OpenJDK 17 | =8-update181 | |
OpenJDK 17 | =8-update191 | |
OpenJDK 17 | =8-update192 | |
OpenJDK 17 | =8-update20 | |
OpenJDK 17 | =8-update201 | |
OpenJDK 17 | =8-update202 | |
OpenJDK 17 | =8-update211 | |
OpenJDK 17 | =8-update212 | |
OpenJDK 17 | =8-update221 | |
OpenJDK 17 | =8-update222 | |
OpenJDK 17 | =8-update231 | |
OpenJDK 17 | =8-update232 | |
OpenJDK 17 | =8-update241 | |
OpenJDK 17 | =8-update242 | |
OpenJDK 17 | =8-update25 | |
OpenJDK 17 | =8-update252 | |
OpenJDK 17 | =8-update262 | |
OpenJDK 17 | =8-update271 | |
OpenJDK 17 | =8-update281 | |
OpenJDK 17 | =8-update282 | |
OpenJDK 17 | =8-update291 | |
OpenJDK 17 | =8-update301 | |
OpenJDK 17 | =8-update302 | |
OpenJDK 17 | =8-update31 | |
OpenJDK 17 | =8-update312 | |
OpenJDK 17 | =8-update40 | |
OpenJDK 17 | =8-update45 | |
OpenJDK 17 | =8-update5 | |
OpenJDK 17 | =8-update51 | |
OpenJDK 17 | =8-update60 | |
OpenJDK 17 | =8-update65 | |
OpenJDK 17 | =8-update66 | |
OpenJDK 17 | =8-update71 | |
OpenJDK 17 | =8-update72 | |
OpenJDK 17 | =8-update73 | |
OpenJDK 17 | =8-update74 | |
OpenJDK 17 | =8-update77 | |
OpenJDK 17 | =8-update91 | |
OpenJDK 17 | =8-update92 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-21349 is classified as low severity due to its potential to cause denial of service.
To mitigate CVE-2022-21349, it is recommended to update affected Oracle Java SE and GraalVM Enterprise Edition versions to the latest patches.
CVE-2022-21349 affects Oracle GraalVM versions 20.3.4 and 21.3.0, as well as JDK versions 1.7.0-update321 and 1.8.0-update311.
CVE-2022-21349 can be exploited through unspecified attack vectors that lead to a denial of service condition.
CVE-2022-21349 can be exploited by unauthenticated users, which increases its risk and potential impact.