{"id":"USN-7098-1","summary":"openjdk-17 vulnerabilities","details":"Andy Boothe discovered that the Networking component of OpenJDK 17 did not\nproperly handle access under certain circumstances. An unauthenticated\nattacker could possibly use this issue to cause a denial of service.\n(CVE-2024-21208)\n\nIt was discovered that the Hotspot component of OpenJDK 17 did not properly\nhandle vectorization under certain circumstances. An unauthenticated\nattacker could possibly use this issue to access unauthorized resources\nand expose sensitive information. (CVE-2024-21210, CVE-2024-21235)\n\nIt was discovered that the Serialization component of OpenJDK 17 did not\nproperly handle deserialization under certain circumstances. An \nunauthenticated attacker could possibly use this issue to cause a denial \nof service. (CVE-2024-21217)\n\nIt was discovered that the Hotspot component of OpenJDK 17 was not properly\nbounding certain UTF-8 strings, which could lead to a buffer overflow. An\nattacker could possibly use this issue to cause a denial of service or\nexecute arbitrary code. This issue was only addressed in Ubuntu 18.04 LTS.\n(CVE-2024-21131)\n\nIt was discovered that the Hotspot component of OpenJDK 17 could be made to\nrun into an infinite loop. If an automated system were tricked into\nprocessing excessively large symbols, an attacker could possibly use this\nissue to cause a denial of service. This issue was only addressed in Ubuntu\n18.04 LTS. (CVE-2024-21138)\n\nIt was discovered that the Hotspot component of OpenJDK 17 did not properly\nperform range check elimination. An attacker could possibly use this issue\nto cause a denial of service, execute arbitrary code or bypass Java\nsandbox restrictions. This issue was only addressed in Ubuntu 18.04 LTS.\n(CVE-2024-21140)\n\nSergey Bylokhov discovered that OpenJDK 17 did not properly manage memory\nwhen handling 2D images. An attacker could possibly use this issue to\nobtain sensitive information. This issue was only addressed in Ubuntu\n18.04 LTS. (CVE-2024-21145)\n\nIt was discovered that the Hotspot component of OpenJDK 17 incorrectly\nhandled memory when performing range check elimination under certain\ncircumstances. An attacker could possibly use this issue to cause a\ndenial of service, execute arbitrary code or bypass Java sandbox\nrestrictions. This issue was only addressed in Ubuntu 18.04 LTS.\n(CVE-2024-21147)\n","modified":"2026-02-10T04:45:49Z","published":"2024-11-11T01:04:46Z","related":["UBUNTU-CVE-2024-21131","UBUNTU-CVE-2024-21138","UBUNTU-CVE-2024-21140","UBUNTU-CVE-2024-21145","UBUNTU-CVE-2024-21147","UBUNTU-CVE-2024-21208","UBUNTU-CVE-2024-21210","UBUNTU-CVE-2024-21217","UBUNTU-CVE-2024-21235"],"upstream":["CVE-2024-21131","CVE-2024-21138","CVE-2024-21140","CVE-2024-21145","CVE-2024-21147","CVE-2024-21208","CVE-2024-21210","CVE-2024-21217","CVE-2024-21235","UBUNTU-CVE-2024-21131","UBUNTU-CVE-2024-21138","UBUNTU-CVE-2024-21140","UBUNTU-CVE-2024-21145","UBUNTU-CVE-2024-21147","UBUNTU-CVE-2024-21208","UBUNTU-CVE-2024-21210","UBUNTU-CVE-2024-21217","UBUNTU-CVE-2024-21235"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-7098-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-21131"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-21138"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-21140"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-21145"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-21147"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-21208"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-21210"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-21217"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-21235"}],"affected":[{"package":{"name":"openjdk-17","ecosystem":"Ubuntu:Pro:18.04:LTS","purl":"pkg:deb/ubuntu/openjdk-17@17.0.13+11-2ubuntu1~18.04.2?arch=source&distro=esm-apps/bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"17.0.13+11-2ubuntu1~18.04.2"}]}],"versions":["17+35-1~18.04","17.0.1+12-1~18.04","17.0.2+8-1~18.04","17.0.3+7-0ubuntu0.18.04.1","17.0.4+8-1~18.04","17.0.5+8-2ubuntu1~18.04","17.0.6+10-0ubuntu1~18.04.1","17.0.7+7~us1-0ubuntu1~18.04","17.0.8+7-1~18.04","17.0.8.1+1~us1-0ubuntu1~18.04","17.0.9+9-1~18.04","17.0.10+7-1~18.04.1","17.0.11+9-1~18.04.1"],"ecosystem_specific":{"availability":"Available with Ubuntu Pro: https://ubuntu.com/pro","binaries":[{"binary_name":"openjdk-17-demo","binary_version":"17.0.13+11-2ubuntu1~18.04.2"},{"binary_name":"openjdk-17-jdk","binary_version":"17.0.13+11-2ubuntu1~18.04.2"},{"binary_name":"openjdk-17-jdk-headless","binary_version":"17.0.13+11-2ubuntu1~18.04.2"},{"binary_name":"openjdk-17-jre","binary_version":"17.0.13+11-2ubuntu1~18.04.2"},{"binary_name":"openjdk-17-jre-headless","binary_version":"17.0.13+11-2ubuntu1~18.04.2"},{"binary_name":"openjdk-17-jre-zero","binary_version":"17.0.13+11-2ubuntu1~18.04.2"},{"binary_name":"openjdk-17-source","binary_version":"17.0.13+11-2ubuntu1~18.04.2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7098-1.json","cves_map":{"ecosystem":"Ubuntu:Pro:18.04:LTS","cves":[{"id":"CVE-2024-21131","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-21138","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-21140","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-21145","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-21147","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-21208","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2024-21210","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2024-21217","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2024-21235","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]}]}}},{"package":{"name":"openjdk-17","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/openjdk-17@17.0.13+11-2ubuntu1~20.04?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"17.0.13+11-2ubuntu1~20.04"}]}],"versions":["17+35-1~20.04","17.0.1+12-1~20.04","17.0.2+8-1~20.04","17.0.3+7-0ubuntu0.20.04.1","17.0.4+8-1~20.04","17.0.5+8-2ubuntu1~20.04","17.0.6+10-0ubuntu1~20.04.1","17.0.7+7~us1-0ubuntu1~20.04","17.0.8+7-1~20.04.2","17.0.8.1+1~us1-0ubuntu1~20.04","17.0.9+9-1~20.04","17.0.10+7-1~20.04.1","17.0.11+9-1~20.04.2","17.0.12+7-1ubuntu2~20.04"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"openjdk-17-demo","binary_version":"17.0.13+11-2ubuntu1~20.04"},{"binary_name":"openjdk-17-jdk","binary_version":"17.0.13+11-2ubuntu1~20.04"},{"binary_name":"openjdk-17-jdk-headless","binary_version":"17.0.13+11-2ubuntu1~20.04"},{"binary_name":"openjdk-17-jre","binary_version":"17.0.13+11-2ubuntu1~20.04"},{"binary_name":"openjdk-17-jre-headless","binary_version":"17.0.13+11-2ubuntu1~20.04"},{"binary_name":"openjdk-17-jre-zero","binary_version":"17.0.13+11-2ubuntu1~20.04"},{"binary_name":"openjdk-17-source","binary_version":"17.0.13+11-2ubuntu1~20.04"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7098-1.json","cves_map":{"ecosystem":"Ubuntu:20.04:LTS","cves":[{"id":"CVE-2024-21208","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2024-21210","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2024-21217","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2024-21235","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]}]}}},{"package":{"name":"openjdk-17","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/openjdk-17@17.0.13+11-2ubuntu1~22.04?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"17.0.13+11-2ubuntu1~22.04"}]}],"versions":["17+35-1","17.0.1+12-1","17.0.2+8-1","17.0.3+7-0ubuntu0.22.04.1","17.0.4+8-1~22.04","17.0.5+8-2ubuntu1~22.04","17.0.6+10-0ubuntu1~22.04","17.0.7+7~us1-0ubuntu1~22.04.2","17.0.8+7-1~22.04","17.0.8.1+1~us1-0ubuntu1~22.04","17.0.9+9-1~22.04","17.0.10+7-1~22.04.1","17.0.11+9-1~22.04.1","17.0.12+7-1ubuntu2~22.04"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"openjdk-17-demo","binary_version":"17.0.13+11-2ubuntu1~22.04"},{"binary_name":"openjdk-17-jdk","binary_version":"17.0.13+11-2ubuntu1~22.04"},{"binary_name":"openjdk-17-jdk-headless","binary_version":"17.0.13+11-2ubuntu1~22.04"},{"binary_name":"openjdk-17-jre","binary_version":"17.0.13+11-2ubuntu1~22.04"},{"binary_name":"openjdk-17-jre-headless","binary_version":"17.0.13+11-2ubuntu1~22.04"},{"binary_name":"openjdk-17-jre-zero","binary_version":"17.0.13+11-2ubuntu1~22.04"},{"binary_name":"openjdk-17-source","binary_version":"17.0.13+11-2ubuntu1~22.04"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7098-1.json","cves_map":{"ecosystem":"Ubuntu:22.04:LTS","cves":[{"id":"CVE-2024-21208","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2024-21210","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2024-21217","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2024-21235","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]}]}}},{"package":{"name":"openjdk-17","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/openjdk-17@17.0.13+11-2ubuntu1~24.04?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"17.0.13+11-2ubuntu1~24.04"}]}],"versions":["17.0.9~6ea-1","17.0.9+9-1","17.0.9+9-2","17.0.10~6ea-1","17.0.10+7-1","17.0.11~7ea-1","17.0.11~7ea-1build1","17.0.11+9-1","17.0.12+7-1ubuntu2~24.04"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_name":"openjdk-17-demo","binary_version":"17.0.13+11-2ubuntu1~24.04"},{"binary_name":"openjdk-17-jdk","binary_version":"17.0.13+11-2ubuntu1~24.04"},{"binary_name":"openjdk-17-jdk-headless","binary_version":"17.0.13+11-2ubuntu1~24.04"},{"binary_name":"openjdk-17-jre","binary_version":"17.0.13+11-2ubuntu1~24.04"},{"binary_name":"openjdk-17-jre-headless","binary_version":"17.0.13+11-2ubuntu1~24.04"},{"binary_name":"openjdk-17-jre-zero","binary_version":"17.0.13+11-2ubuntu1~24.04"},{"binary_name":"openjdk-17-source","binary_version":"17.0.13+11-2ubuntu1~24.04"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7098-1.json","cves_map":{"ecosystem":"Ubuntu:24.04:LTS","cves":[{"id":"CVE-2024-21208","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2024-21210","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2024-21217","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"},{"type":"Ubuntu","score":"low"}]},{"id":"CVE-2024-21235","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]}]}}}],"schema_version":"1.7.3"}