Lucene search

K
ubuntuUbuntuUSN-6932-1
HistoryJul 31, 2024 - 12:00 a.m.

OpenJDK 21 vulnerabilities

2024-07-3100:00:00
ubuntu.com
29
openjdk
ubuntu
24.04 lts
22.04 lts
20.04 lts
hotspot component
buffer overflow
denial of service
execute arbitrary code
cve-2024-21131
infinite loop
excessively large symbols
range check elimination
java sandbox restrictions
sergey bylokhov
2d images
sensitive information
memory handling
unix

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

8.9

Confidence

Low

Releases

  • Ubuntu 24.04 LTS
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS

Packages

  • openjdk-21 - Open Source Java implementation

Details

It was discovered that the Hotspot component of OpenJDK 21 was not properly
performing bounds when handling certain UTF-8 strings, which could lead to
a buffer overflow. An attacker could possibly use this issue to cause a
denial of service or execute arbitrary code. (CVE-2024-21131)

It was discovered that the Hotspot component of OpenJDK 21 could be made to
run into an infinite loop. If an automated system were tricked into
processing excessively large symbols, an attacker could possibly use this
issue to cause a denial of service. (CVE-2024-21138)

It was discovered that the Hotspot component of OpenJDK 21 did not
properly perform range check elimination. An attacker could possibly use
this issue to cause a denial of service, execute arbitrary code or bypass
Java sandbox restrictions. (CVE-2024-21140)

Sergey Bylokhov discovered that OpenJDK 21 did not properly manage memory
when handling 2D images. An attacker could possibly use this issue to
obtain sensitive information. (CVE-2024-21145)

It was discovered that the Hotspot component of OpenJDK 21 incorrectly
handled memory when performing range check elimination under certain
circumstances. An attacker could possibly use this issue to cause a
denial of service, execute arbitrary code or bypass Java sandbox
restrictions. (CVE-2024-21147)

OSVersionArchitecturePackageVersionFilename
Ubuntu24.04noarchopenjdk-21-jdk< 21.0.4+7-1ubuntu2~24.04UNKNOWN
Ubuntu24.04noarchopenjdk-21-dbg< 21.0.4+7-1ubuntu2~24.04UNKNOWN
Ubuntu24.04noarchopenjdk-21-demo< 21.0.4+7-1ubuntu2~24.04UNKNOWN
Ubuntu24.04noarchopenjdk-21-doc< 21.0.4+7-1ubuntu2~24.04UNKNOWN
Ubuntu24.04noarchopenjdk-21-jdk-headless< 21.0.4+7-1ubuntu2~24.04UNKNOWN
Ubuntu24.04noarchopenjdk-21-jre< 21.0.4+7-1ubuntu2~24.04UNKNOWN
Ubuntu24.04noarchopenjdk-21-jre-headless< 21.0.4+7-1ubuntu2~24.04UNKNOWN
Ubuntu24.04noarchopenjdk-21-jre-zero< 21.0.4+7-1ubuntu2~24.04UNKNOWN
Ubuntu24.04noarchopenjdk-21-source< 21.0.4+7-1ubuntu2~24.04UNKNOWN
Ubuntu24.04noarchopenjdk-21-testsupport< 21.0.4+7-1ubuntu2~24.04UNKNOWN
Rows per page:
1-10 of 301

CVSS3

7.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

8.9

Confidence

Low