{"id":"USN-6813-1","summary":"openjdk-21 vulnerabilities","details":"It was discovered that the Hotspot component of OpenJDK 21 incorrectly\nhandled certain exceptions with specially crafted long messages. An\nattacker could possibly use this issue to cause a denial of service.\n(CVE-2024-21011)\n\nIt was discovered that OpenJDK 21 incorrectly performed reverse DNS\nquery under certain circumstances in the Networking/HTTP client\ncomponent. An attacker could possibly use this issue to obtain sensitive\ninformation. (CVE-2024-21012)\n\nVladimir Kondratyev discovered that the Hotspot component of OpenJDK 21\nincorrectly handled address offset calculations in the C1 compiler. An\nattacker could possibly use this issue to cause a denial of service\nor execute arbitrary code. (CVE-2024-21068)\n\nIt was discovered that the Hotspot component of OpenJDK 21 incorrectly\nhandled array accesses in the C2 compiler. An attacker could possibly use\nthis issue to cause a denial of service or execute arbitrary code.\n(CVE-2024-21094)\n","modified":"2026-02-10T04:43:49Z","published":"2024-06-06T01:57:21Z","related":["UBUNTU-CVE-2024-21011","UBUNTU-CVE-2024-21012","UBUNTU-CVE-2024-21068","UBUNTU-CVE-2024-21094"],"upstream":["CVE-2024-21011","CVE-2024-21012","CVE-2024-21068","CVE-2024-21094","UBUNTU-CVE-2024-21011","UBUNTU-CVE-2024-21012","UBUNTU-CVE-2024-21068","UBUNTU-CVE-2024-21094"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6813-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-21011"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-21012"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-21068"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-21094"}],"affected":[{"package":{"name":"openjdk-21","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/openjdk-21@21.0.3+9-1ubuntu1~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"21.0.3+9-1ubuntu1~20.04.1"}]}],"versions":["21.0.1+12-2~20.04.1","21.0.2+13-1~20.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"openjdk-21-demo","binary_version":"21.0.3+9-1ubuntu1~20.04.1"},{"binary_name":"openjdk-21-jdk","binary_version":"21.0.3+9-1ubuntu1~20.04.1"},{"binary_name":"openjdk-21-jdk-headless","binary_version":"21.0.3+9-1ubuntu1~20.04.1"},{"binary_name":"openjdk-21-jre","binary_version":"21.0.3+9-1ubuntu1~20.04.1"},{"binary_name":"openjdk-21-jre-headless","binary_version":"21.0.3+9-1ubuntu1~20.04.1"},{"binary_name":"openjdk-21-jre-zero","binary_version":"21.0.3+9-1ubuntu1~20.04.1"},{"binary_name":"openjdk-21-source","binary_version":"21.0.3+9-1ubuntu1~20.04.1"},{"binary_name":"openjdk-21-testsupport","binary_version":"21.0.3+9-1ubuntu1~20.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6813-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-21011"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-21012"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-21068"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-21094"}],"ecosystem":"Ubuntu:20.04:LTS"}}},{"package":{"name":"openjdk-21","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/openjdk-21@21.0.3+9-1ubuntu1~22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"21.0.3+9-1ubuntu1~22.04.1"}]}],"versions":["21.0.1+12-2~22.04","21.0.2+13-1~22.04.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"openjdk-21-demo","binary_version":"21.0.3+9-1ubuntu1~22.04.1"},{"binary_name":"openjdk-21-jdk","binary_version":"21.0.3+9-1ubuntu1~22.04.1"},{"binary_name":"openjdk-21-jdk-headless","binary_version":"21.0.3+9-1ubuntu1~22.04.1"},{"binary_name":"openjdk-21-jre","binary_version":"21.0.3+9-1ubuntu1~22.04.1"},{"binary_name":"openjdk-21-jre-headless","binary_version":"21.0.3+9-1ubuntu1~22.04.1"},{"binary_name":"openjdk-21-jre-zero","binary_version":"21.0.3+9-1ubuntu1~22.04.1"},{"binary_name":"openjdk-21-source","binary_version":"21.0.3+9-1ubuntu1~22.04.1"},{"binary_name":"openjdk-21-testsupport","binary_version":"21.0.3+9-1ubuntu1~22.04.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6813-1.json","cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-21011"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-21012"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-21068"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2024-21094"}],"ecosystem":"Ubuntu:22.04:LTS"}}}],"schema_version":"1.7.3"}