Improper Input Validation Affecting openjdk-jre package, versions [,1.8.0_401) [11.0.0,11.0.22) [17.0.0,17.0.10) [21.0.0,21.0.2)


0.0
medium

Snyk CVSS

    Attack Complexity High
    Integrity High

    Threat Intelligence

    EPSS 0.05% (17th percentile)
Expand this section
NVD
5.9 medium
Expand this section
Red Hat
5.9 medium
Expand this section
SUSE
5.9 medium

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-UPSTREAM-OPENJDKJRE-6164709
  • published 17 Jan 2024
  • disclosed 16 Jan 2024
  • credit Unknown

How to fix?

Upgrade openjdk-jre to version 8.0.401, 11.0.22, 17.0.10, 21.0.2 or higher.

Overview

openjdk-jre is a free and open-source implementation of the Java Platform, Standard Edition (Java SE).

Affected versions of this package are vulnerable to Improper Input Validation due to a flaw in the JVM class file verifier in the hotspot/runtime component. An attacker can execute unverified bytecode by crafting a malicious input that bypasses the verification process.

Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service.