Buffer Overflow Affecting openjdk-jre package, versions [1.7.0, 1.7.0_261) [1.8.0, 1.8.0_251) [11.0.0, 11.0.7) [14.0.0, 14.0.1)


0.0
high

Snyk CVSS

    Attack Complexity High
    User Interaction Required
    Confidentiality High
    Integrity High
    Availability High

    Threat Intelligence

    EPSS 0.16% (52nd percentile)
Expand this section
NVD
8.3 high
Expand this section
SUSE
8.3 high
Expand this section
Red Hat
7.5 high

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-UPSTREAM-OPENJDKJRE-565491
  • published 15 Apr 2020
  • disclosed 15 Apr 2020
  • credit Nils Emmerich of ERNW

How to fix?

Upgrade openjdk-jre to version 7.0.261, 8.0.251, 11.0.7, 14.0.1 or higher.

Overview

openjdk-jre is a free and open-source implementation of the Java Platform, Standard Edition (Java SE).

Affected versions of this package are vulnerable to Buffer Overflow. A flaw was found in the boundary checks in the java.nio buffer classes in the Libraries component of OpenJDK, where it is bypassed in certain cases. This flaw allows an untrusted Java application or applet o bypass Java sandbox restrictions.