• CVE-2024-20921

发布时间: 2024年2月2日

修改时间: 2024年11月29日

概要

Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.

CVSS v3 指标

NVD openEuler
Confidentiality High
Attack Vector Network
CVSS评分 N/A 5.9
Attack Complexity High
Privileges Required None
Scope Unchanged
Integrity None
User Interaction None
Availability None

安全公告

公告名 概要 发布时间
KylinSec-SA-2024-1389 openjdk-1.8.0 security update 2024年2月2日
KylinSec-SA-2024-1570 openjdk-11 security update 2024年2月8日
KylinSec-SA-2024-3005 openjdk-11 security update 2024年2月8日
KylinSec-SA-2024-4389 openjdk-latest security update 2024年12月30日
KylinSec-SA-2024-4390 openjdk-latest security update 2024年12月30日

影响产品

产品 状态
KY3.4-4A openjdk-1.8.0 Fixed
KY3.5.2 openjdk-1.8.0 Fixed
KY3.4-5A openjdk-1.8.0 Fixed
KY3.5.1 openjdk-1.8.0 Fixed
V6 openjdk-1.8.0 Fixed
KY3.5.3 openjdk-1.8.0 Fixed