Sandbox Bypass Affecting openjdk-jre package, versions [, 1.8.0_301) [11.0.0, 11.0.12) [16.0.0, 16.0.2)
Snyk CVSS
Attack Complexity
High
User Interaction
Required
Confidentiality
High
Integrity
High
Availability
High
Threat Intelligence
EPSS
0.24% (62nd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UPSTREAM-OPENJDKJRE-1320697
- published 21 Jul 2021
- disclosed 20 Jul 2021
- credit Unknown
Introduced: 20 Jul 2021
CVE-2021-2388 Open this link in a new tabHow to fix?
Upgrade openjdk-jre
to version 8.0.301, 11.0.12, 16.0.2 or higher.
Overview
openjdk-jre is a free and open-source implementation of the Java Platform, Standard Edition (Java SE).
Affected versions of this package are vulnerable to Sandbox Bypass. A flaw was found in the way the Hotspot
component of OpenJDK performed range check elimination. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions.