{"id":"USN-7096-1","summary":"openjdk-8 vulnerabilities","details":"Andy Boothe discovered that the Networking component of OpenJDK 8 did not\nproperly handle access under certain circumstances. An unauthenticated \nattacker could possibly use this issue to cause a denial of service. \n(CVE-2024-21208)\n\nIt was discovered that the Hotspot component of OpenJDK 8 did not properly\nhandle vectorization under certain circumstances. An unauthenticated \nattacker could possibly use this issue to access unauthorized resources \nand expose sensitive information. (CVE-2024-21210, CVE-2024-21235)\n\nIt was discovered that the Serialization component of OpenJDK 8 did not \nproperly handle deserialization under certain circumstances. An \nunauthenticated attacker could possibly use this issue to cause a denial\nof service. (CVE-2024-21217)\n\nIt was discovered that the Hotspot component of OpenJDK 8 was not properly\nbounding certain UTF-8 strings, which could lead to a buffer overflow. An\nattacker could possibly use this issue to cause a denial of service or\nexecute arbitrary code. This issue was only addressed in Ubuntu 16.04 LTS.\n(CVE-2024-21131)\n\nIt was discovered that the Hotspot component of OpenJDK 8 could be made to\nrun into an infinite loop. If an automated system were tricked into\nprocessing excessively large symbols, an attacker could possibly use this\nissue to cause a denial of service. This issue was only addressed in Ubuntu\n16.04 LTS. (CVE-2024-21138)\n\nIt was discovered that the Hotspot component of OpenJDK 8 did not properly\nperform range check elimination. An attacker could possibly use this issue\nto cause a denial of service, execute arbitrary code or bypass Java\nsandbox restrictions. This issue was only addressed in Ubuntu 16.04 LTS. \n(CVE-2024-21140)\n\nYakov Shafranovich discovered that the Concurrency component of OpenJDK 8\nincorrectly performed header validation in the Pack200 archive format. An\nattacker could possibly use this issue to cause a denial of service. This \nissue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21144)\n\nSergey Bylokhov discovered that OpenJDK 8 did not properly manage memory\nwhen handling 2D images. An attacker could possibly use this issue to\nobtain sensitive information. This issue was only addressed in Ubuntu \n16.04 LTS. (CVE-2024-21145)\n\nIt was discovered that the Hotspot component of OpenJDK 8 incorrectly\nhandled memory when performing range check elimination under certain\ncircumstances. An attacker could possibly use this issue to cause a\ndenial of service, execute arbitrary code or bypass Java sandbox\nrestrictions. This issue was only addressed in Ubuntu 16.04 LTS. \n(CVE-2024-21147)\n\nIt was discovered that the Hotspot component of OpenJDK 8 incorrectly\nhandled certain exceptions with specially crafted long messages. An\nattacker could possibly use this issue to cause a denial of service.\nThis issue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21011)\n\nVladimir Kondratyev discovered that the Hotspot component of OpenJDK 8\nincorrectly handled address offset calculations in the C1 compiler. An\nattacker could possibly use this issue to cause a denial of service\nor execute arbitrary code. This issue was only addressed in Ubuntu\n16.04 LTS. (CVE-2024-21068)\n\nYakov Shafranovich discovered that OpenJDK 8 did not properly manage\nmemory in the Pack200 archive format. An attacker could possibly use this\nissue to cause a denial of service. This issue was only addressed in Ubuntu\n16.04 LTS. (CVE-2024-21085)\n\nIt was discovered that the Hotspot component of OpenJDK 8 incorrectly\nhandled array accesses in the C2 compiler. An attacker could possibly use\nthis issue to cause a denial of service or execute arbitrary code. This\nissue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-21094)\n\nYi Yang discovered that the Hotspot component of OpenJDK 8 incorrectly\nhandled array accesses in the C1 compiler. An attacker could possibly\nuse this issue to cause a denial of service, execute arbitrary code or\nbypass Java sandbox restrictions. This issue was only addressed in Ubuntu\n16.04 LTS. (CVE-2024-20918)\n\nIt was discovered that the Hotspot component of OpenJDK 8 did not\nproperly verify bytecode in certain situations. An attacker could\npossibly use this issue to bypass Java sandbox restrictions. This \nissue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20919)\n\nIt was discovered that the Hotspot component of OpenJDK 8 had an\noptimization flaw when generating range check loop predicates. An attacker\ncould possibly use this issue to cause a denial of service, execute\narbitrary code or bypass Java sandbox restrictions. This issue was only \naddressed in Ubuntu 16.04 LTS. (CVE-2024-20921)\n\nValentin Eudeline discovered that OpenJDK 8 incorrectly handled certain\noptions in the Nashorn JavaScript subcomponent. An attacker could\npossibly use this issue to execute arbitrary code. This issue was only \naddressed in Ubuntu 16.04 LTS. (CVE-2024-20926)\n\nIt was discovered that OpenJDK 8 could produce debug logs that contained\nprivate keys used for digital signatures. An attacker could possibly use\nthis issue to obtain sensitive information. This issue was only addressed\nin Ubuntu 16.04 LTS. (CVE-2024-20945)\n\nHubert Kario discovered that the TLS implementation in OpenJDK 8 had a\ntiming side-channel and incorrectly handled RSA padding. A remote attacker\ncould possibly use this issue to recover sensitive information. This \nissue was only addressed in Ubuntu 16.04 LTS. (CVE-2024-20952)\n","modified":"2026-04-24T09:54:15.952889Z","published":"2024-11-11T01:00:09Z","related":["UBUNTU-CVE-2024-20918","UBUNTU-CVE-2024-20919","UBUNTU-CVE-2024-20921","UBUNTU-CVE-2024-20926","UBUNTU-CVE-2024-20945","UBUNTU-CVE-2024-20952","UBUNTU-CVE-2024-21011","UBUNTU-CVE-2024-21068","UBUNTU-CVE-2024-21085","UBUNTU-CVE-2024-21094","UBUNTU-CVE-2024-21131","UBUNTU-CVE-2024-21138","UBUNTU-CVE-2024-21140","UBUNTU-CVE-2024-21144","UBUNTU-CVE-2024-21145","UBUNTU-CVE-2024-21147","UBUNTU-CVE-2024-21208","UBUNTU-CVE-2024-21210","UBUNTU-CVE-2024-21217","UBUNTU-CVE-2024-21235"],"upstream":["CVE-2024-20918","CVE-2024-20919","CVE-2024-20921","CVE-2024-20926","CVE-2024-20945","CVE-2024-20952","CVE-2024-21011","CVE-2024-21068","CVE-2024-21085","CVE-2024-21094","CVE-2024-21131","CVE-2024-21138","CVE-2024-21140","CVE-2024-21144","CVE-2024-21145","CVE-2024-21147","CVE-2024-21208","CVE-2024-21210","CVE-2024-21217","CVE-2024-21235","UBUNTU-CVE-2024-20918","UBUNTU-CVE-2024-20919","UBUNTU-CVE-2024-20921","UBUNTU-CVE-2024-20926","UBUNTU-CVE-2024-20945","UBUNTU-CVE-2024-20952","UBUNTU-CVE-2024-21011","UBUNTU-CVE-2024-21068","UBUNTU-CVE-2024-21085","UBUNTU-CVE-2024-21094","UBUNTU-CVE-2024-21131","UBUNTU-CVE-2024-21138","UBUNTU-CVE-2024-21140","UBUNTU-CVE-2024-21144","UBUNTU-CVE-2024-21145","UBUNTU-CVE-2024-21147","UBUNTU-CVE-2024-21208","UBUNTU-CVE-2024-21210","UBUNTU-CVE-2024-21217","UBUNTU-CVE-2024-21235"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7096-1"}],"affected":[{"package":{"name":"openjdk-8","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/openjdk-8@8u432-ga~us1-0ubuntu2~16.04.4?arch=source&distro=esm-infra/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8u432-ga~us1-0ubuntu2~16.04.4"}]}],"versions":["8u66-b01-5","8u72-b05-1ubuntu1","8u72-b05-5","8u72-b05-6","8u72-b15-1","8u72-b15-2ubuntu1","8u72-b15-2ubuntu3","8u72-b15-3ubuntu1","8u77-b03-1ubuntu2","8u77-b03-3ubuntu1","8u77-b03-3ubuntu2","8u77-b03-3ubuntu3","8u91-b14-0ubuntu4~16.04.1","8u91-b14-3ubuntu1~16.04.1","8u111-b14-2ubuntu0.16.04.2","8u121-b13-0ubuntu1.16.04.2","8u131-b11-0ubuntu1.16.04.2","8u131-b11-2ubuntu1.16.04.2","8u131-b11-2ubuntu1.16.04.3","8u151-b12-0ubuntu0.16.04.2","8u162-b12-0ubuntu0.16.04.2","8u171-b11-0ubuntu0.16.04.1","8u181-b13-0ubuntu0.16.04.1","8u181-b13-1ubuntu0.16.04.1","8u191-b12-0ubuntu0.16.04.1","8u191-b12-2ubuntu0.16.04.1","8u212-b03-0ubuntu1.16.04.1","8u222-b10-1ubuntu1~16.04.1","8u232-b09-0ubuntu1~16.04.1","8u242-b08-0ubuntu3~16.04","8u252-b09-1~16.04","8u265-b01-0ubuntu2~16.04","8u272-b10-0ubuntu1~16.04","8u275-b01-0ubuntu1~16.04","8u282-b08-0ubuntu1~16.04","8u292-b10-0ubuntu1~16.04.1","8u312-b07-0ubuntu1~16.04","8u342-b07-0ubuntu1~16.04","8u352-ga-1~16.04","8u362-ga-0ubuntu1~16.04.1","8u372-ga~us1-0ubuntu1~16.04","8u382-ga-1~16.04.1","8u392-ga-1~16.04"],"ecosystem_specific":{"binaries":[{"binary_name":"openjdk-8-demo","binary_version":"8u432-ga~us1-0ubuntu2~16.04.4"},{"binary_name":"openjdk-8-jdk","binary_version":"8u432-ga~us1-0ubuntu2~16.04.4"},{"binary_name":"openjdk-8-jdk-headless","binary_version":"8u432-ga~us1-0ubuntu2~16.04.4"},{"binary_name":"openjdk-8-jre","binary_version":"8u432-ga~us1-0ubuntu2~16.04.4"},{"binary_name":"openjdk-8-jre-headless","binary_version":"8u432-ga~us1-0ubuntu2~16.04.4"},{"binary_name":"openjdk-8-jre-jamvm","binary_version":"8u432-ga~us1-0ubuntu2~16.04.4"},{"binary_name":"openjdk-8-jre-zero","binary_version":"8u432-ga~us1-0ubuntu2~16.04.4"},{"binary_name":"openjdk-8-source","binary_version":"8u432-ga~us1-0ubuntu2~16.04.4"}],"availability":"Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:16.04:LTS","cves":[]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7096-1.json"}},{"package":{"name":"openjdk-8","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/openjdk-8@8u432-ga~us1-0ubuntu2~18.04?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8u432-ga~us1-0ubuntu2~18.04"}]}],"versions":["8u144-b01-2","8u151-b12-1","8u162-b12-1","8u171-b11-0ubuntu0.18.04.1","8u181-b13-0ubuntu0.18.04.1","8u181-b13-1ubuntu0.18.04.1","8u191-b12-0ubuntu0.18.04.1","8u191-b12-2ubuntu0.18.04.1","8u212-b03-0ubuntu1.18.04.1","8u222-b10-1ubuntu1~18.04.1","8u232-b09-0ubuntu1~18.04.1","8u242-b08-0ubuntu3~18.04","8u252-b09-1~18.04","8u265-b01-0ubuntu2~18.04","8u272-b10-0ubuntu1~18.04","8u275-b01-0ubuntu1~18.04","8u282-b08-0ubuntu1~18.04","8u292-b10-0ubuntu1~18.04","8u312-b07-0ubuntu1~18.04","8u342-b07-0ubuntu1~18.04","8u352-ga-1~18.04","8u362-ga-0ubuntu1~18.04.1","8u372-ga~us1-0ubuntu1~18.04","8u382-ga-1~18.04.1","8u392-ga-1~18.04","8u402-ga-2ubuntu1~18.04","8u412-ga-1~18.04.1","8u422-b05-1~18.04"],"ecosystem_specific":{"binaries":[{"binary_name":"openjdk-8-demo","binary_version":"8u432-ga~us1-0ubuntu2~18.04"},{"binary_name":"openjdk-8-jdk","binary_version":"8u432-ga~us1-0ubuntu2~18.04"},{"binary_name":"openjdk-8-jdk-headless","binary_version":"8u432-ga~us1-0ubuntu2~18.04"},{"binary_name":"openjdk-8-jre","binary_version":"8u432-ga~us1-0ubuntu2~18.04"},{"binary_name":"openjdk-8-jre-headless","binary_version":"8u432-ga~us1-0ubuntu2~18.04"},{"binary_name":"openjdk-8-jre-zero","binary_version":"8u432-ga~us1-0ubuntu2~18.04"},{"binary_name":"openjdk-8-source","binary_version":"8u432-ga~us1-0ubuntu2~18.04"}],"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:Pro:18.04:LTS","cves":[]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7096-1.json"}},{"package":{"name":"openjdk-8","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/openjdk-8@8u432-ga~us1-0ubuntu2~20.04?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8u432-ga~us1-0ubuntu2~20.04"}]}],"versions":["8u232-b09-0ubuntu1","8u232-b09-1","8u242-b04-1","8u242-b08-0ubuntu3","8u252-b07-1","8u252-b09-1ubuntu1","8u265-b01-0ubuntu2~20.04","8u272-b10-0ubuntu1~20.04","8u275-b01-0ubuntu1~20.04","8u282-b08-0ubuntu1~20.04","8u292-b10-0ubuntu1~20.04","8u312-b07-0ubuntu1~20.04","8u342-b07-0ubuntu1~20.04","8u352-ga-1~20.04","8u362-ga-0ubuntu1~20.04.1","8u372-ga~us1-0ubuntu1~20.04","8u382-ga-1~20.04.1","8u392-ga-1~20.04","8u402-ga-2ubuntu1~20.04","8u412-ga-1~20.04.1","8u422-b05-1~20.04"],"ecosystem_specific":{"binaries":[{"binary_name":"openjdk-8-demo","binary_version":"8u432-ga~us1-0ubuntu2~20.04"},{"binary_name":"openjdk-8-jdk","binary_version":"8u432-ga~us1-0ubuntu2~20.04"},{"binary_name":"openjdk-8-jdk-headless","binary_version":"8u432-ga~us1-0ubuntu2~20.04"},{"binary_name":"openjdk-8-jre","binary_version":"8u432-ga~us1-0ubuntu2~20.04"},{"binary_name":"openjdk-8-jre-headless","binary_version":"8u432-ga~us1-0ubuntu2~20.04"},{"binary_name":"openjdk-8-jre-zero","binary_version":"8u432-ga~us1-0ubuntu2~20.04"},{"binary_name":"openjdk-8-source","binary_version":"8u432-ga~us1-0ubuntu2~20.04"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7096-1.json"}},{"package":{"name":"openjdk-8","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/openjdk-8@8u432-ga~us1-0ubuntu2~22.04?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8u432-ga~us1-0ubuntu2~22.04"}]}],"versions":["8u302-b08-0ubuntu2","8u312-b07-0ubuntu1","8u342-b07-0ubuntu1~22.04","8u352-ga-1~22.04","8u362-ga-0ubuntu1~22.04","8u372-ga~us1-0ubuntu1~22.04","8u382-ga-1~22.04.1","8u392-ga-1~22.04","8u402-ga-2ubuntu1~22.04","8u412-ga-1~22.04.1","8u422-b05-1~22.04"],"ecosystem_specific":{"binaries":[{"binary_name":"openjdk-8-demo","binary_version":"8u432-ga~us1-0ubuntu2~22.04"},{"binary_name":"openjdk-8-jdk","binary_version":"8u432-ga~us1-0ubuntu2~22.04"},{"binary_name":"openjdk-8-jdk-headless","binary_version":"8u432-ga~us1-0ubuntu2~22.04"},{"binary_name":"openjdk-8-jre","binary_version":"8u432-ga~us1-0ubuntu2~22.04"},{"binary_name":"openjdk-8-jre-headless","binary_version":"8u432-ga~us1-0ubuntu2~22.04"},{"binary_name":"openjdk-8-jre-zero","binary_version":"8u432-ga~us1-0ubuntu2~22.04"},{"binary_name":"openjdk-8-source","binary_version":"8u432-ga~us1-0ubuntu2~22.04"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7096-1.json"}},{"package":{"name":"openjdk-8","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/openjdk-8@8u432-ga~us1-0ubuntu2~24.04?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8u432-ga~us1-0ubuntu2~24.04"}]}],"versions":["8u382-ga-1ubuntu1","8u392-ga-1","8u402-ga-1","8u402-ga-2","8u402-ga-2ubuntu1","8u402-ga-2ubuntu6","8u402-ga-2ubuntu7","8u402-ga-8build1","8u412-ga-1~24.04.2","8u422-b05-1~24.04"],"ecosystem_specific":{"binaries":[{"binary_name":"openjdk-8-demo","binary_version":"8u432-ga~us1-0ubuntu2~24.04"},{"binary_name":"openjdk-8-jdk","binary_version":"8u432-ga~us1-0ubuntu2~24.04"},{"binary_name":"openjdk-8-jdk-headless","binary_version":"8u432-ga~us1-0ubuntu2~24.04"},{"binary_name":"openjdk-8-jre","binary_version":"8u432-ga~us1-0ubuntu2~24.04"},{"binary_name":"openjdk-8-jre-headless","binary_version":"8u432-ga~us1-0ubuntu2~24.04"},{"binary_name":"openjdk-8-jre-zero","binary_version":"8u432-ga~us1-0ubuntu2~24.04"},{"binary_name":"openjdk-8-source","binary_version":"8u432-ga~us1-0ubuntu2~24.04"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"ecosystem":"Ubuntu:24.04:LTS","cves":[]},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7096-1.json"}}],"schema_version":"1.7.5"}