Bug 2257850 (CVE-2024-20926)
Summary: | CVE-2024-20926 OpenJDK: arbitrary Java code execution in Nashorn (8314284) | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Mauro Matteo Cascella <mcascell> |
Component: | vulnerability | Assignee: | Product Security <prodsec-ir-bot> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | ahughes, caswilli, chazlett, fjansen, kaycoth, khosford, mbalao, neugens, pjindal, security-response-team, sraghupu |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2257303 | ||
Bug Blocks: | 2257260 |
Description
Mauro Matteo Cascella
2024-01-11 10:04:08 UTC
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2024:0225 https://access.redhat.com/errata/RHSA-2024:0225 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2024:0234 https://access.redhat.com/errata/RHSA-2024:0234 This issue has been addressed in the following products: Red Hat Build of OpenJDK 8u402 Via RHSA-2024:0222 https://access.redhat.com/errata/RHSA-2024:0222 This issue has been addressed in the following products: Red Hat Build of OpenJDK 8u402 Via RHSA-2024:0230 https://access.redhat.com/errata/RHSA-2024:0230 This issue has been addressed in the following products: Red Hat Build of OpenJDK 11.0.22 Via RHSA-2024:0231 https://access.redhat.com/errata/RHSA-2024:0231 This issue has been addressed in the following products: Red Hat Build of OpenJDK 11.0.22 Via RHSA-2024:0239 https://access.redhat.com/errata/RHSA-2024:0239 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2024:0224 https://access.redhat.com/errata/RHSA-2024:0224 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2024:0223 https://access.redhat.com/errata/RHSA-2024:0223 This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2024:0232 https://access.redhat.com/errata/RHSA-2024:0232 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2024:0226 https://access.redhat.com/errata/RHSA-2024:0226 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2024:0233 https://access.redhat.com/errata/RHSA-2024:0233 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2024:0235 https://access.redhat.com/errata/RHSA-2024:0235 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Red Hat Enterprise Linux 8 Red Hat Enterprise Linux 9.2 Extended Update Support Red Hat Enterprise Linux 9 Via RHSA-2024:0265 https://access.redhat.com/errata/RHSA-2024:0265 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2024:0228 https://access.redhat.com/errata/RHSA-2024:0228 This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2024:0237 https://access.redhat.com/errata/RHSA-2024:0237 This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Red Hat Enterprise Linux 8 Red Hat Enterprise Linux 9.2 Extended Update Support Red Hat Enterprise Linux 9 Via RHSA-2024:0266 https://access.redhat.com/errata/RHSA-2024:0266 OpenJDK-8 upstream commit: https://github.com/openjdk/jdk8u/commit/5e0e2bf0baa0b8b5d36deae548c27b2608fb539f OpenJDK-11 upstream commit: https://github.com/openjdk/jdk11u/commit/8fe2b2959e174c8d8263bb5a8d68672c99fd7b5f Oracle CPU January 2024: https://www.oracle.com/security-alerts/cpujan2024.html#AppendixJAVA Fixed in Oracle Java SE 8u401, 8u401-perf, 11.0.22. Release notes: https://www.oracle.com/java/technologies/javase/8u401-relnotes.html https://www.oracle.com/java/technologies/javase/8u401-perf-relnotes.html https://www.oracle.com/java/technologies/javase/11-0-22-relnotes.html |