Lucene search

K
redhatRedHatRHSA-2024:1820
HistoryApr 17, 2024 - 11:44 a.m.

(RHSA-2024:1820) Moderate: OpenJDK 11.0.23 Security Update for Windows Builds

2024-04-1711:44:17
access.redhat.com
28
openjdk 11
security update
windows builds
cve-2024-21011
cve-2024-21068
cve-2024-21085
cve-2024-21094
cve-2024-21012

CVSS3

3.7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

7.5

Confidence

High

EPSS

0.001

Percentile

20.6%

The OpenJDK 11 packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

This release of the Red Hat build of OpenJDK 11 (11.0.23) for Windows serves as a replacement for the Red Hat build of OpenJDK 11 (11.0.22) and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.

Security Fix(es):

  • OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011)

  • OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068)

  • OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085)

  • OpenJDK: C2 compilation fails with “Exceeded _node_regs array” (8317507) (CVE-2024-21094)

  • OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) (CVE-2024-21012)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVSS3

3.7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

7.5

Confidence

High

EPSS

0.001

Percentile

20.6%