First published: Fri Apr 15 2022(Updated: )
An unspecified vulnerability in Java SE related to the Libraries component could allow an unauthenticated attacker to cause no confidentiality impact, low integrity impact, and no availability impact.
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/java | <11-openjdk-1:11.0.15.0.9-2.el7_9 | 11-openjdk-1:11.0.15.0.9-2.el7_9 |
redhat/java | <1.8.0-openjdk-1:1.8.0.332.b09-1.el7_9 | 1.8.0-openjdk-1:1.8.0.332.b09-1.el7_9 |
redhat/java | <1.7.1-ibm-1:1.7.1.5.10-1jpp.1.el7 | 1.7.1-ibm-1:1.7.1.5.10-1jpp.1.el7 |
redhat/java | <1.8.0-ibm-1:1.8.0.7.10-1jpp.1.el7 | 1.8.0-ibm-1:1.8.0.7.10-1jpp.1.el7 |
redhat/java | <11-openjdk-1:11.0.15.0.9-2.el8_5 | 11-openjdk-1:11.0.15.0.9-2.el8_5 |
redhat/java | <17-openjdk-1:17.0.3.0.6-2.el8_5 | 17-openjdk-1:17.0.3.0.6-2.el8_5 |
redhat/java | <1.8.0-openjdk-1:1.8.0.332.b09-1.el8_5 | 1.8.0-openjdk-1:1.8.0.332.b09-1.el8_5 |
redhat/java | <1.8.0-ibm-1:1.8.0.7.10-1.el8_6 | 1.8.0-ibm-1:1.8.0.7.10-1.el8_6 |
redhat/java | <11-openjdk-1:11.0.15.0.9-2.el8_1 | 11-openjdk-1:11.0.15.0.9-2.el8_1 |
redhat/java | <1.8.0-openjdk-1:1.8.0.332.b09-1.el8_1 | 1.8.0-openjdk-1:1.8.0.332.b09-1.el8_1 |
redhat/java | <11-openjdk-1:11.0.15.0.9-2.el8_2 | 11-openjdk-1:11.0.15.0.9-2.el8_2 |
redhat/java | <1.8.0-openjdk-1:1.8.0.332.b09-1.el8_2 | 1.8.0-openjdk-1:1.8.0.332.b09-1.el8_2 |
redhat/java | <11-openjdk-1:11.0.15.0.9-2.el8_4 | 11-openjdk-1:11.0.15.0.9-2.el8_4 |
redhat/java | <1.8.0-openjdk-1:1.8.0.332.b09-1.el8_4 | 1.8.0-openjdk-1:1.8.0.332.b09-1.el8_4 |
redhat/java | <11-openjdk-1:11.0.15.0.10-1.el9_0 | 11-openjdk-1:11.0.15.0.10-1.el9_0 |
redhat/java | <17-openjdk-1:17.0.3.0.7-1.el9_0 | 17-openjdk-1:17.0.3.0.7-1.el9_0 |
redhat/java | <1.8.0-openjdk-1:1.8.0.332.b09-1.el9_0 | 1.8.0-openjdk-1:1.8.0.332.b09-1.el9_0 |
debian/openjdk-11 | 11.0.16+8-1~deb10u1 11.0.20+8-1~deb10u1 11.0.20+8-1~deb11u1 11.0.21+9-1 | |
debian/openjdk-17 | 17.0.7+7-1~deb11u1 17.0.8+7-1~deb12u1 17.0.9+9-1 | |
debian/openjdk-8 | 8u382-ga-2 | |
IBM Cognos Command Center | <=10.2.4.1 | |
Oracle GraalVM Enterprise Edition | =20.3.5 | |
Oracle GraalVM Enterprise Edition | =21.3.1 | |
Oracle GraalVM Enterprise Edition | =22.0.0.2 | |
Oracle JDK 6 | =1.7.0-update331 | |
Oracle JDK 6 | =1.8.0-update321 | |
Oracle JDK 6 | =11.0.14 | |
Oracle JDK 6 | =17.0.2 | |
Oracle JDK 6 | =18 | |
Oracle Java Runtime Environment (JRE) | =1.7.0-update331 | |
Oracle Java Runtime Environment (JRE) | =1.8.0-update321 | |
Oracle Java Runtime Environment (JRE) | =11.0.14 | |
Oracle Java Runtime Environment (JRE) | =17.0.2 | |
Oracle Java Runtime Environment (JRE) | =18 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
NetApp 7-Mode Transition Tool | ||
netapp active iq unified manager vsphere | ||
netapp active iq unified manager windows | ||
netapp cloud insights acquisition unit | ||
netapp cloud secure agent | ||
NetApp E-Series SANtricity OS Controller | >=11.0.0<=11.70.1 | |
netapp e-series santricity storage manager | ||
netapp e-series santricity Web services Web services proxy | ||
NetApp OnCommand Insight | ||
netapp santricity unified manager | ||
netapp solidfire\, enterprise sds \& hci storage node | ||
netapp solidfire \& hci management node | ||
netapp hci compute node firmware | ||
azul zulu | =6.45 | |
azul zulu | =7.52 | |
azul zulu | =8.60 | |
azul zulu | =11.54 | |
azul zulu | =13.46 | |
azul zulu | =15.38 | |
azul zulu | =17.32 | |
azul zulu | =18.28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-21434 has a low integrity impact but no confidentiality or availability impact.
To fix CVE-2022-21434, update to the recommended versions provided, such as 11-openjdk-1:11.0.15.0.9-2.el7_9 or equivalent.
CVE-2022-21434 affects several products including Oracle Java SE, GraalVM Enterprise Edition, and various OpenJDK versions.
Yes, an unauthenticated attacker can potentially exploit CVE-2022-21434 due to its unspecified nature.
There are no specific workarounds; the recommended action is to upgrade to the specified fixed versions.