CWE
119
Advisory Published

USN-7097-1: OpenJDK 11 vulnerabilities

First published: Mon Nov 11 2024(Updated: )

Andy Boothe discovered that the Networking component of OpenJDK 11 did not properly handle access under certain circumstances. An unauthenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-21208) It was discovered that the Hotspot component of OpenJDK 11 did not properly handle vectorization under certain circumstances. An unauthenticated attacker could possibly use this issue to access unauthorized resources and expose sensitive information. (CVE-2024-21210, CVE-2024-21235) It was discovered that the Serialization component of OpenJDK 11 did not properly handle deserialization under certain circumstances. An unauthenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-21217) It was discovered that the Hotspot component of OpenJDK 11 was not properly bounding certain UTF-8 strings, which could lead to a buffer overflow. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21131) It was discovered that the Hotspot component of OpenJDK 11 could be made to run into an infinite loop. If an automated system were tricked into processing excessively large symbols, an attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21138) It was discovered that the Hotspot component of OpenJDK 11 did not properly perform range check elimination. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21140) Yakov Shafranovich discovered that the Concurrency component of OpenJDK 11 incorrectly performed header validation in the Pack200 archive format. An attacker could possibly use this issue to cause a denial of service. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21144) Sergey Bylokhov discovered that OpenJDK 11 did not properly manage memory when handling 2D images. An attacker could possibly use this issue to obtain sensitive information. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21145) It was discovered that the Hotspot component of OpenJDK 11 incorrectly handled memory when performing range check elimination under certain circumstances. An attacker could possibly use this issue to cause a denial of service, execute arbitrary code or bypass Java sandbox restrictions. This issue was only addressed in Ubuntu 18.04 LTS. (CVE-2024-21147)

Affected SoftwareAffected VersionHow to fix
All of
ubuntu/openjdk-11-jdk<11.0.25+9-1ubuntu1~24.10
11.0.25+9-1ubuntu1~24.10
Ubuntu Ubuntu=24.10
All of
ubuntu/openjdk-11-jdk-headless<11.0.25+9-1ubuntu1~24.10
11.0.25+9-1ubuntu1~24.10
Ubuntu Ubuntu=24.10
All of
ubuntu/openjdk-11-jre<11.0.25+9-1ubuntu1~24.10
11.0.25+9-1ubuntu1~24.10
Ubuntu Ubuntu=24.10
All of
ubuntu/openjdk-11-jre-headless<11.0.25+9-1ubuntu1~24.10
11.0.25+9-1ubuntu1~24.10
Ubuntu Ubuntu=24.10
All of
ubuntu/openjdk-11-jre-zero<11.0.25+9-1ubuntu1~24.10
11.0.25+9-1ubuntu1~24.10
Ubuntu Ubuntu=24.10
All of
ubuntu/openjdk-11-jdk<11.0.25+9-1ubuntu1~24.04
11.0.25+9-1ubuntu1~24.04
Ubuntu Ubuntu=24.04
All of
ubuntu/openjdk-11-jdk-headless<11.0.25+9-1ubuntu1~24.04
11.0.25+9-1ubuntu1~24.04
Ubuntu Ubuntu=24.04
All of
ubuntu/openjdk-11-jre<11.0.25+9-1ubuntu1~24.04
11.0.25+9-1ubuntu1~24.04
Ubuntu Ubuntu=24.04
All of
ubuntu/openjdk-11-jre-headless<11.0.25+9-1ubuntu1~24.04
11.0.25+9-1ubuntu1~24.04
Ubuntu Ubuntu=24.04
All of
ubuntu/openjdk-11-jre-zero<11.0.25+9-1ubuntu1~24.04
11.0.25+9-1ubuntu1~24.04
Ubuntu Ubuntu=24.04
All of
ubuntu/openjdk-11-jdk<11.0.25+9-1ubuntu1~22.04
11.0.25+9-1ubuntu1~22.04
Ubuntu Ubuntu=22.04
All of
ubuntu/openjdk-11-jdk-headless<11.0.25+9-1ubuntu1~22.04
11.0.25+9-1ubuntu1~22.04
Ubuntu Ubuntu=22.04
All of
ubuntu/openjdk-11-jre<11.0.25+9-1ubuntu1~22.04
11.0.25+9-1ubuntu1~22.04
Ubuntu Ubuntu=22.04
All of
ubuntu/openjdk-11-jre-headless<11.0.25+9-1ubuntu1~22.04
11.0.25+9-1ubuntu1~22.04
Ubuntu Ubuntu=22.04
All of
ubuntu/openjdk-11-jre-zero<11.0.25+9-1ubuntu1~22.04
11.0.25+9-1ubuntu1~22.04
Ubuntu Ubuntu=22.04
All of
ubuntu/openjdk-11-jdk<11.0.25+9-1ubuntu1~20.04
11.0.25+9-1ubuntu1~20.04
Ubuntu Ubuntu=20.04
All of
ubuntu/openjdk-11-jdk-headless<11.0.25+9-1ubuntu1~20.04
11.0.25+9-1ubuntu1~20.04
Ubuntu Ubuntu=20.04
All of
ubuntu/openjdk-11-jre<11.0.25+9-1ubuntu1~20.04
11.0.25+9-1ubuntu1~20.04
Ubuntu Ubuntu=20.04
All of
ubuntu/openjdk-11-jre-headless<11.0.25+9-1ubuntu1~20.04
11.0.25+9-1ubuntu1~20.04
Ubuntu Ubuntu=20.04
All of
ubuntu/openjdk-11-jre-zero<11.0.25+9-1ubuntu1~20.04
11.0.25+9-1ubuntu1~20.04
Ubuntu Ubuntu=20.04
All of
ubuntu/openjdk-11-jdk<11.0.25+9-1ubuntu1~18.04
11.0.25+9-1ubuntu1~18.04
Ubuntu Ubuntu=18.04
All of
ubuntu/openjdk-11-jdk-headless<11.0.25+9-1ubuntu1~18.04
11.0.25+9-1ubuntu1~18.04
Ubuntu Ubuntu=18.04
All of
ubuntu/openjdk-11-jre<11.0.25+9-1ubuntu1~18.04
11.0.25+9-1ubuntu1~18.04
Ubuntu Ubuntu=18.04
All of
ubuntu/openjdk-11-jre-headless<11.0.25+9-1ubuntu1~18.04
11.0.25+9-1ubuntu1~18.04
Ubuntu Ubuntu=18.04
All of
ubuntu/openjdk-11-jre-zero<11.0.25+9-1ubuntu1~18.04
11.0.25+9-1ubuntu1~18.04
Ubuntu Ubuntu=18.04

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203