Bug 2257720 (CVE-2024-20932)
Summary: | CVE-2024-20932 OpenJDK: incorrect handling of ZIP files with duplicate entries (8276123) | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Mauro Matteo Cascella <mcascell> |
Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
Status: | NEW --- | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | ahughes, caswilli, chazlett, fjansen, kaycoth, khosford, mbalao, neugens, pjindal, security-response-team, sraghupu |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2257303 | ||
Bug Blocks: | 2257260 |
Description
Mauro Matteo Cascella
2024-01-10 15:43:31 UTC
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2024:0241 https://access.redhat.com/errata/RHSA-2024:0241 This issue has been addressed in the following products: Red Hat Build of OpenJDK 17.0.10 Via RHSA-2024:0246 https://access.redhat.com/errata/RHSA-2024:0246 This issue has been addressed in the following products: Red Hat Build of OpenJDK 17.0.10 Via RHSA-2024:0240 https://access.redhat.com/errata/RHSA-2024:0240 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Red Hat Enterprise Linux 8 Red Hat Enterprise Linux 9.2 Extended Update Support Red Hat Enterprise Linux 9 Via RHSA-2024:0267 https://access.redhat.com/errata/RHSA-2024:0267 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2024:0242 https://access.redhat.com/errata/RHSA-2024:0242 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2024:0244 https://access.redhat.com/errata/RHSA-2024:0244 OpenJDK-17 upstream commit: https://github.com/openjdk/jdk17u/commit/f6f32bf256e34447f54be823fdfb2e64e235e404 Oracle CPU January 2024: https://www.oracle.com/security-alerts/cpujan2024.html#AppendixJAVA Fixed in Oracle Java SE 17.0.10. Release notes: https://www.oracle.com/java/technologies/javase/17-0-10-relnotes.html |