It was discovered that the Hotspot component of OpenJDK was missing range checks when accessing an array in a loop. An untrusted Java application or applet could use this flaw to corrupt JVM memory and cause it to crash or, possibly, execute arbitrary code, bypassing Java sandbox restrictions.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2024:0249 https://access.redhat.com/errata/RHSA-2024:0249
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2024:0225 https://access.redhat.com/errata/RHSA-2024:0225
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2024:0234 https://access.redhat.com/errata/RHSA-2024:0234
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2024:0241 https://access.redhat.com/errata/RHSA-2024:0241
This issue has been addressed in the following products: Red Hat Build of OpenJDK 8u402 Via RHSA-2024:0222 https://access.redhat.com/errata/RHSA-2024:0222
This issue has been addressed in the following products: Red Hat Build of OpenJDK 8u402 Via RHSA-2024:0230 https://access.redhat.com/errata/RHSA-2024:0230
This issue has been addressed in the following products: Red Hat Build of OpenJDK 11.0.22 Via RHSA-2024:0231 https://access.redhat.com/errata/RHSA-2024:0231
This issue has been addressed in the following products: Red Hat Build of OpenJDK 11.0.22 Via RHSA-2024:0239 https://access.redhat.com/errata/RHSA-2024:0239
This issue has been addressed in the following products: Red Hat Build of OpenJDK 17.0.10 Via RHSA-2024:0246 https://access.redhat.com/errata/RHSA-2024:0246
This issue has been addressed in the following products: Red Hat Build of OpenJDK 17.0.10 Via RHSA-2024:0240 https://access.redhat.com/errata/RHSA-2024:0240
This issue has been addressed in the following products: Red Hat Build of OpenJDK 21.0.2 Via RHSA-2024:0247 https://access.redhat.com/errata/RHSA-2024:0247
This issue has been addressed in the following products: Red Hat Build of OpenJDK 21.0.2 Via RHSA-2024:0250 https://access.redhat.com/errata/RHSA-2024:0250
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2024:0224 https://access.redhat.com/errata/RHSA-2024:0224
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2024:0223 https://access.redhat.com/errata/RHSA-2024:0223
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2024:0232 https://access.redhat.com/errata/RHSA-2024:0232
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2024:0226 https://access.redhat.com/errata/RHSA-2024:0226
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions Red Hat Enterprise Linux 8.2 Telecommunications Update Service Via RHSA-2024:0233 https://access.redhat.com/errata/RHSA-2024:0233
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2024:0235 https://access.redhat.com/errata/RHSA-2024:0235
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Red Hat Enterprise Linux 8 Red Hat Enterprise Linux 9.2 Extended Update Support Red Hat Enterprise Linux 9 Via RHSA-2024:0265 https://access.redhat.com/errata/RHSA-2024:0265
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Red Hat Enterprise Linux 8 Red Hat Enterprise Linux 9.2 Extended Update Support Red Hat Enterprise Linux 9 Via RHSA-2024:0267 https://access.redhat.com/errata/RHSA-2024:0267
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2024:0228 https://access.redhat.com/errata/RHSA-2024:0228
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Extended Update Support Via RHSA-2024:0242 https://access.redhat.com/errata/RHSA-2024:0242
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2024:0237 https://access.redhat.com/errata/RHSA-2024:0237
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2024:0244 https://access.redhat.com/errata/RHSA-2024:0244
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2024:0248 https://access.redhat.com/errata/RHSA-2024:0248
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Red Hat Enterprise Linux 8 Red Hat Enterprise Linux 9.2 Extended Update Support Red Hat Enterprise Linux 9 Via RHSA-2024:0266 https://access.redhat.com/errata/RHSA-2024:0266
OpenJDK-8 upstream commit: https://github.com/openjdk/jdk8u/commit/199cb32f93a625626e09db625c63595d4bbe9fea OpenJDK-11 upstream commit: https://github.com/openjdk/jdk11u/commit/4576161fb39dc5eea99b050d44935280bb27ebb9 OpenJDK-17 upstream commit: https://github.com/openjdk/jdk17u/commit/35d9cb6ff437b121f83c67202deee682b9152ad2 OpenJDK-21 upstream commit: https://github.com/openjdk/jdk21u/commit/2621f68c0672092254a52414705d0e916a3a3fbc
Oracle CPU January 2024: https://www.oracle.com/security-alerts/cpujan2024.html#AppendixJAVA Fixed in Oracle Java SE 8u401, 8u401-perf, 11.0.22, 17.0.10, 21.0.2. Release notes: https://www.oracle.com/java/technologies/javase/8u401-relnotes.html https://www.oracle.com/java/technologies/javase/8u401-perf-relnotes.html https://www.oracle.com/java/technologies/javase/11-0-22-relnotes.html https://www.oracle.com/java/technologies/javase/17-0-10-relnotes.html https://www.oracle.com/java/technologies/javase/21-0-2-relnotes.html
Relevant excerpt from release notes: -> Potential Performance Regression Due to Limited Range Check Elimination (JDK-8314468 (not public)) When the C1 compiler is the only compiler available to the VM, it applies loop predication to remove array access range checks from loop bodies. Due to a defect, this optimization was disabled, potentially leading to a performance regression. This only affects the client VM or VM's running with the non-default command line flags -XX:+NeverActAsServerClassMachine or -XX:TieredStopAtLevel=[1,2,3].