First published: Tue Jul 16 2024(Updated: )
The OpenJDK 17 packages provide the OpenJDK 17 Java Runtime Environment and the OpenJDK 17 Java Software Development Kit.<br>This release of the Red Hat build of OpenJDK 17 (17.0.12) for Windows serves as a replacement for the Red Hat build of OpenJDK 17 (17.0.11) and includes security and bug fixes, and enhancements. For further information, refer to the release notes linked to in the References section.<br>Security Fix(es):<br><li> OpenJDK: RangeCheckElimination array index overflow (8323231) (CVE-2024-21147)</li> <li> OpenJDK: potential UTF8 size overflow (8314794) (CVE-2024-21131)</li> <li> OpenJDK: Excessive symbol length can lead to infinite loop (8319859) (CVE-2024-21138)</li> <li> OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) (CVE-2024-21140)</li> <li> OpenJDK: Out-of-bounds access in 2D image handling (8324559) (CVE-2024-21145)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat OpenJDK | <17.0.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:4569 is classified as important due to potential security vulnerabilities that could be exploited.
To fix RHSA-2024:4569, upgrade to the updated OpenJDK 17 package version 17.0.12.
RHSA-2024:4569 affects versions of Red Hat OpenJDK 17 up to and including 17.0.11.
RHSA-2024:4569 impacts the OpenJDK 17 Java Runtime Environment and Software Development Kit.
There are no recommended manual workarounds for RHSA-2024:4569; the best mitigation is to apply the security updates.