Improper Input Validation Affecting openjdk-jre package, versions [,1.8.0_401) [11.0.0,11.0.22) [17.0.0,17.0.10) [21.0.0,21.0.2)
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-UPSTREAM-OPENJDKJRE-6164709
- published 17 Jan 2024
- disclosed 16 Jan 2024
- credit Unknown
Introduced: 16 Jan 2024
CVE-2024-20919 Open this link in a new tabHow to fix?
Upgrade openjdk-jre
to version 8.0.401, 11.0.22, 17.0.10, 21.0.2 or higher.
Overview
openjdk-jre is a free and open-source implementation of the Java Platform, Standard Edition (Java SE).
Affected versions of this package are vulnerable to Improper Input Validation due to a flaw in the JVM class file verifier in the hotspot/runtime
component. An attacker can execute unverified bytecode by crafting a malicious input that bypasses the verification process.
Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service.