|
|
Subscribe / Log in / New account

Red Hat alert RHSA-2024:0244-01 (java-17-openjdk)

An update for java-17-openjdk is now available for Red Hat Enterprise Linux
9.0 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

The java-17-openjdk packages provide the OpenJDK 17 Java Runtime Environment
and the OpenJDK 17 Java Software Development Kit.

Security Fix(es):

* OpenJDK: array out-of-bounds access due to missing range check in C1
compiler (8314468) (CVE-2024-20918)

* OpenJDK: incorrect handling of ZIP files with duplicate entries (8276123)
(CVE-2024-20932)

* OpenJDK: RSA padding issue and timing side-channel attack against TLS
(8317547) (CVE-2024-20952)

* OpenJDK: JVM class file verifier flaw allows unverified bytecode execution
(8314295) (CVE-2024-20919)

* OpenJDK: range check loop optimization issue (8314307) (CVE-2024-20921)

* OpenJDK: logging of digital signature private keys (8316976)
(CVE-2024-20945)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* When Transparent Huge Pages (THP) are unconditionally enabled on a system,
Java applications using many threads were found to have a large Resident Set
Size (RSS). This was due to a race between the kernel transforming thread
stack memory into huge pages and the Java Virtual Machine (JVM) shattering
these pages into smaller ones when adding a guard page. This release resolves
this issue by getting glibc to insert a guard page and prevent the creation
of huge pages. (RHEL-13933)

This content is licensed under the Creative Commons Attribution 4.0
International License (https://creativecommons.org/licenses/by/4.0/). If you
distribute this content, or a modified version of it, you must provide
attribution to Red Hat Inc. and provide a link to the original.

Original: https://access.redhat.com/security/data/csaf/v2/advisories/2024/rhsa-2024_0244.json


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds