Lucene search

K
rockyRockylinux Product ErrataRLSA-2024:1822
HistoryMay 06, 2024 - 1:04 p.m.

java-11-openjdk security update

2024-05-0613:04:21
Rockylinux Product Errata
errata.rockylinux.org
21
security update
java-11-openjdk
rocky linux 8
exception message
integer overflow
memory allocation
c2 compilation
dns lookup
cve
cvss

CVSS3

3.7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

7.5

Confidence

High

EPSS

0.001

Percentile

20.6%

An update is available for java-11-openjdk.
This update affects Rocky Linux 8.
A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE list
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

  • OpenJDK: long Exception message leading to crash (8319851) (CVE-2024-21011)

  • OpenJDK: integer overflow in C1 compiler address generation (8322122) (CVE-2024-21068)

  • OpenJDK: Pack200 excessive memory allocation (8322114) (CVE-2024-21085)

  • OpenJDK: C2 compilation fails with “Exceeded _node_regs array” (8317507) (CVE-2024-21094)

  • OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) (CVE-2024-21012)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVSS3

3.7

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

7.5

Confidence

High

EPSS

0.001

Percentile

20.6%