{"id":"USN-6662-1","summary":"openjdk-21 vulnerabilities","details":"Yi Yang discovered that the Hotspot component of OpenJDK 21 incorrectly\nhandled array accesses in the C1 compiler. An attacker could possibly\nuse this issue to cause a denial of service, execute arbitrary code or\nbypass Java sandbox restrictions. (CVE-2024-20918)\n\nIt was discovered that the Hotspot component of OpenJDK 21 did not\nproperly verify bytecode in certain situations. An attacker could\npossibly use this issue to bypass Java sandbox restrictions.\n(CVE-2024-20919)\n\nIt was discovered that the Hotspot component of OpenJDK 21 had an\noptimization flaw when generating range check loop predicates. An attacker\ncould possibly use this issue to cause a denial of service, execute\narbitrary code or bypass Java sandbox restrictions. (CVE-2024-20921)\n\nIt was discovered that OpenJDK 21 could produce debug logs that contained\nprivate keys used for digital signatures. An attacker could possibly use\nthis issue to obtain sensitive information. (CVE-2024-20945)\n\nHubert Kario discovered that the TLS implementation in OpenJDK 21 had a\ntiming side-channel and incorrectly handled RSA padding. A remote attacker\ncould possibly use this issue to recover sensitive information.\n(CVE-2024-20952)\n","modified":"2026-02-10T04:43:31Z","published":"2024-02-27T02:12:05Z","related":["UBUNTU-CVE-2024-20918","UBUNTU-CVE-2024-20919","UBUNTU-CVE-2024-20921","UBUNTU-CVE-2024-20945","UBUNTU-CVE-2024-20952"],"upstream":["CVE-2024-20918","CVE-2024-20919","CVE-2024-20921","CVE-2024-20945","CVE-2024-20952","UBUNTU-CVE-2024-20918","UBUNTU-CVE-2024-20919","UBUNTU-CVE-2024-20921","UBUNTU-CVE-2024-20945","UBUNTU-CVE-2024-20952"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6662-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-20918"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-20919"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-20921"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-20945"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-20952"}],"affected":[{"package":{"name":"openjdk-21","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/openjdk-21@21.0.2+13-1~20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"21.0.2+13-1~20.04.1"}]}],"versions":["21.0.1+12-2~20.04.1"],"ecosystem_specific":{"binaries":[{"binary_version":"21.0.2+13-1~20.04.1","binary_name":"openjdk-21-demo"},{"binary_version":"21.0.2+13-1~20.04.1","binary_name":"openjdk-21-jdk"},{"binary_version":"21.0.2+13-1~20.04.1","binary_name":"openjdk-21-jdk-headless"},{"binary_version":"21.0.2+13-1~20.04.1","binary_name":"openjdk-21-jre"},{"binary_version":"21.0.2+13-1~20.04.1","binary_name":"openjdk-21-jre-headless"},{"binary_version":"21.0.2+13-1~20.04.1","binary_name":"openjdk-21-jre-zero"},{"binary_version":"21.0.2+13-1~20.04.1","binary_name":"openjdk-21-source"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-20918"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-20919"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-20921"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-20945"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-20952"}],"ecosystem":"Ubuntu:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6662-1.json"}},{"package":{"name":"openjdk-21","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/openjdk-21@21.0.2+13-1~22.04.1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"21.0.2+13-1~22.04.1"}]}],"versions":["21.0.1+12-2~22.04"],"ecosystem_specific":{"binaries":[{"binary_version":"21.0.2+13-1~22.04.1","binary_name":"openjdk-21-demo"},{"binary_version":"21.0.2+13-1~22.04.1","binary_name":"openjdk-21-jdk"},{"binary_version":"21.0.2+13-1~22.04.1","binary_name":"openjdk-21-jdk-headless"},{"binary_version":"21.0.2+13-1~22.04.1","binary_name":"openjdk-21-jre"},{"binary_version":"21.0.2+13-1~22.04.1","binary_name":"openjdk-21-jre-headless"},{"binary_version":"21.0.2+13-1~22.04.1","binary_name":"openjdk-21-jre-zero"},{"binary_version":"21.0.2+13-1~22.04.1","binary_name":"openjdk-21-source"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-20918"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-20919"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-20921"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-20945"},{"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N"},{"type":"Ubuntu","score":"medium"}],"id":"CVE-2024-20952"}],"ecosystem":"Ubuntu:22.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6662-1.json"}}],"schema_version":"1.7.3"}