Bug 2257720 (CVE-2024-20932)

Summary: CVE-2024-20932 OpenJDK: incorrect handling of ZIP files with duplicate entries (8276123)
Product: [Other] Security Response Reporter: Mauro Matteo Cascella <mcascell>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: ahughes, caswilli, chazlett, fjansen, kaycoth, khosford, mbalao, neugens, pjindal, security-response-team, sraghupu
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2257303    
Bug Blocks: 2257260    

Description Mauro Matteo Cascella 2024-01-10 15:43:31 UTC
It was discovered that the Libraries component in OpenJDK failed to properly handle ZIP archives that contain a file and directory entry with the same name within the ZIP file. This could lead to integrity issues when extracting data from such archives. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions.

Comment 4 errata-xmlrpc 2024-01-17 09:01:52 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2024:0241 https://access.redhat.com/errata/RHSA-2024:0241

Comment 5 errata-xmlrpc 2024-01-17 14:06:53 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 17.0.10

Via RHSA-2024:0246 https://access.redhat.com/errata/RHSA-2024:0246

Comment 6 errata-xmlrpc 2024-01-17 14:07:07 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 17.0.10

Via RHSA-2024:0240 https://access.redhat.com/errata/RHSA-2024:0240

Comment 7 errata-xmlrpc 2024-01-17 19:01:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support
  Red Hat Enterprise Linux 8
  Red Hat Enterprise Linux 9.2 Extended Update Support
  Red Hat Enterprise Linux 9

Via RHSA-2024:0267 https://access.redhat.com/errata/RHSA-2024:0267

Comment 8 errata-xmlrpc 2024-01-17 19:14:48 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2024:0242 https://access.redhat.com/errata/RHSA-2024:0242

Comment 9 errata-xmlrpc 2024-01-17 19:15:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2024:0244 https://access.redhat.com/errata/RHSA-2024:0244

Comment 10 Mauro Matteo Cascella 2024-02-14 20:13:43 UTC
OpenJDK-17 upstream commit:
https://github.com/openjdk/jdk17u/commit/f6f32bf256e34447f54be823fdfb2e64e235e404

Comment 11 Mauro Matteo Cascella 2024-02-15 09:18:20 UTC
Oracle CPU January 2024:

https://www.oracle.com/security-alerts/cpujan2024.html#AppendixJAVA

Fixed in Oracle Java SE 17.0.10.

Release notes:
https://www.oracle.com/java/technologies/javase/17-0-10-relnotes.html