cnvd-2022-15475
Vulnerability from cnvd
Title
Oracle GraalVM输入验证错误漏洞(CNVD-2022-15475)
Description
Oracle GraalVM是美国甲骨文(Oracle)公司的一套使用Java语言编写的即时编译器。该产品支持多种编程语言和执行模式。GraalVM Enterprise Edition是GraalVM的企业版。 Oracle GraalVM存在输入验证错误漏洞,该漏洞的存在是由于Oracle GraalVM企业版中序列化组件中的输入验证不正确。远程未经身份验证的攻击者可以利用此漏洞来操纵数据。
Severity
Patch Name
Oracle GraalVM输入验证错误漏洞(CNVD-2022-15475)的补丁
Patch Description
Oracle GraalVM是美国甲骨文(Oracle)公司的一套使用Java语言编写的即时编译器。该产品支持多种编程语言和执行模式。GraalVM Enterprise Edition是GraalVM的企业版。 Oracle GraalVM存在输入验证错误漏洞,该漏洞的存在是由于Oracle GraalVM企业版中序列化组件中的输入验证不正确。远程未经身份验证的攻击者可以利用此漏洞来操纵数据。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已发布升级补丁以修复漏洞,补丁获取链接: http://www.oracle.com/security-alerts/cpujan2022.html?3082

Reference
http://www.oracle.com/security-alerts/cpujan2022.html?3082
Impacted products
Name
['Oracle Oracle Java SE 7u321', 'Oracle Oracle Java SE 8u311', 'Oracle Oracle Java SE 11.0.13', 'Oracle Oracle Java SE 17.01', 'Oracle Oracle GraalVM Enterprise Edition 20.3.4', 'Oracle Oracle GraalVM Enterprise Edition 21.3.0']
Show details on source website


{
  "cves": {
    "cve": {
      "cveNumber": "CVE-2022-21291",
      "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2022-21291"
    }
  },
  "description": "Oracle GraalVM\u662f\u7f8e\u56fd\u7532\u9aa8\u6587\uff08Oracle\uff09\u516c\u53f8\u7684\u4e00\u5957\u4f7f\u7528Java\u8bed\u8a00\u7f16\u5199\u7684\u5373\u65f6\u7f16\u8bd1\u5668\u3002\u8be5\u4ea7\u54c1\u652f\u6301\u591a\u79cd\u7f16\u7a0b\u8bed\u8a00\u548c\u6267\u884c\u6a21\u5f0f\u3002GraalVM Enterprise Edition\u662fGraalVM\u7684\u4f01\u4e1a\u7248\u3002\n\nOracle GraalVM\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u7684\u5b58\u5728\u662f\u7531\u4e8eOracle GraalVM\u4f01\u4e1a\u7248\u4e2d\u5e8f\u5217\u5316\u7ec4\u4ef6\u4e2d\u7684\u8f93\u5165\u9a8c\u8bc1\u4e0d\u6b63\u786e\u3002\u8fdc\u7a0b\u672a\u7ecf\u8eab\u4efd\u9a8c\u8bc1\u7684\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6b64\u6f0f\u6d1e\u6765\u64cd\u7eb5\u6570\u636e\u3002",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttp://www.oracle.com/security-alerts/cpujan2022.html?3082",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2022-15475",
  "openTime": "2022-03-01",
  "patchDescription": "Oracle GraalVM\u662f\u7f8e\u56fd\u7532\u9aa8\u6587\uff08Oracle\uff09\u516c\u53f8\u7684\u4e00\u5957\u4f7f\u7528Java\u8bed\u8a00\u7f16\u5199\u7684\u5373\u65f6\u7f16\u8bd1\u5668\u3002\u8be5\u4ea7\u54c1\u652f\u6301\u591a\u79cd\u7f16\u7a0b\u8bed\u8a00\u548c\u6267\u884c\u6a21\u5f0f\u3002GraalVM Enterprise Edition\u662fGraalVM\u7684\u4f01\u4e1a\u7248\u3002\r\n\r\nOracle GraalVM\u5b58\u5728\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u7684\u5b58\u5728\u662f\u7531\u4e8eOracle GraalVM\u4f01\u4e1a\u7248\u4e2d\u5e8f\u5217\u5316\u7ec4\u4ef6\u4e2d\u7684\u8f93\u5165\u9a8c\u8bc1\u4e0d\u6b63\u786e\u3002\u8fdc\u7a0b\u672a\u7ecf\u8eab\u4efd\u9a8c\u8bc1\u7684\u653b\u51fb\u8005\u53ef\u4ee5\u5229\u7528\u6b64\u6f0f\u6d1e\u6765\u64cd\u7eb5\u6570\u636e\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Oracle GraalVM\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff08CNVD-2022-15475\uff09\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Oracle Oracle Java SE 7u321",
      "Oracle Oracle Java SE 8u311",
      "Oracle Oracle Java SE 11.0.13",
      "Oracle Oracle Java SE 17.01",
      "Oracle Oracle GraalVM Enterprise Edition 20.3.4",
      "Oracle Oracle GraalVM Enterprise Edition 21.3.0"
    ]
  },
  "referenceLink": "http://www.oracle.com/security-alerts/cpujan2022.html?3082",
  "serverity": "\u4e2d",
  "submitTime": "2022-01-24",
  "title": "Oracle GraalVM\u8f93\u5165\u9a8c\u8bc1\u9519\u8bef\u6f0f\u6d1e\uff08CNVD-2022-15475\uff09"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…