org.graalvm.sdk:graal-sdk@21.0.0 vulnerabilities

  • latest version

    24.2.0

  • latest non vulnerable version

  • first published

    6 years ago

  • latest version published

    1 months ago

  • licenses detected

  • package registry

  • Direct Vulnerabilities

    Known vulnerabilities in the org.graalvm.sdk:graal-sdk package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • M
    Buffer Overflow

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Buffer Overflow in hotspot/compiler due to improper handling of buffers in addnode.cpp.

    How to fix Buffer Overflow?

    Upgrade org.graalvm.sdk:graal-sdk to version 17.0.15, 21.0.7, 24.0.1 or higher.

    [,17.0.15)[18.0.0,21.0.7)[22.0.0,24.0.1)
    • M
    Heap-based Buffer Overflow

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Heap-based Buffer Overflow in the Graphics.copyArea functionality in client-libs/2d. An attacker can manipulate memory and potentially execute code.

    How to fix Heap-based Buffer Overflow?

    Upgrade org.graalvm.sdk:graal-sdk to version 17.0.15, 21.0.7, 24.0.1 or higher.

    [,17.0.15)[18.0.0,21.0.7)[22.0.0,24.0.1)
    • C
    Timing Attack

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Timing Attack in security-libs/javax.net.ssl that exposes information from a TLS handshake via side channel.

    How to fix Timing Attack?

    Upgrade org.graalvm.sdk:graal-sdk to version 17.0.15, 21.0.7, 24.0.1 or higher.

    [,17.0.15)[18.0.0,21.0.7)[22.0.0,24.0.1)
    • M
    Signed to Unsigned Conversion Error

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Signed to Unsigned Conversion Error through the use of multiple protocols. An attacker can compromise accessible data and perform unauthorized update, insert, or delete operations by exploiting APIs in the specified component, typically through a web service which supplies data to these APIs.

    Note:

    This is only exploitable if Java deployments load and run untrusted code from the internet and rely on the Java sandbox for security.

    How to fix Signed to Unsigned Conversion Error?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.17, 21.3.13 or higher.

    [,20.3.17)[21.0.0,21.3.13)
    • M
    Access Control Bypass

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Access Control Bypass via the Compiler component. An attacker can manipulate data by exploiting unprotected APIs or services that interact with the APIs.

    How to fix Access Control Bypass?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.16, 21.3.12 or higher.

    [,20.3.16)[21.0.0,21.3.12)
    • M
    Denial of Service (DoS)

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Denial of Service (DoS) via the Serialization component. An attacker can cause a partial disruption of service by exploiting network access to send crafted data to the APIs involved.

    How to fix Denial of Service (DoS)?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.16, 21.3.12 or higher.

    [,20.3.16)[21.0.0,21.3.12)
    • M
    Denial of Service (DoS)

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Denial of Service (DoS) via the Networking component. An attacker can cause a partial disruption of service by exploiting network protocols to send crafted data or requests.

    How to fix Denial of Service (DoS)?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.16, 21.3.12 or higher.

    [,20.3.16)[21.0.0,21.3.12)
    • M
    Information Exposure

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Information Exposure via the Hotspot component. An attacker with network access via multiple protocols can compromise the integrity and confidentiality of data by exploiting accessible APIs, particularly through web services that supply data to these APIs.

    Note:

    This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.

    How to fix Information Exposure?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.16, 21.3.12 or higher.

    [,20.3.16)[21.0.0,21.3.12)
    • C
    Improper Access Control

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Improper Access Control via the Hotspot component. An attacker can compromise the integrity and confidentiality of data by exploiting network access protocols to send crafted data to the APIs. This vulnerability also affects Java deployments that execute untrusted code, relying on Java's sandbox for security.

    How to fix Improper Access Control?

    Upgrade org.graalvm.sdk:graal-sdk to version 17.0.12, 21.0.4, 22.0.2 or higher.

    [17.0.0,17.0.12)[21.0.0,21.0.4)[22.0.0,22.0.2)
    • M
    Improper Access Control

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Improper Access Control via the 2D component. An attacker can achieve unauthorized update, insert, or delete access to some accessible data as well as unauthorized read access to a subset of accessible data by exploiting the APIs through a web service which supplies data to these APIs. This is only exploitable in environments where Java applications, such as sandboxed Java Web Start applications or sandboxed Java applets, load and run untrusted code that relies on the Java sandbox for security.

    How to fix Improper Access Control?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.15, 21.3.11 or higher.

    [20.0.0,20.3.15)[21.0.0,21.3.11)
    • M
    Resource Exhaustion

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Resource Exhaustion via multiple protocols. An attacker can cause a partial disruption of service by exploiting network access.

    Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code.

    How to fix Resource Exhaustion?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.15, 21.3.11 or higher.

    [,20.3.15)[21.0.0,21.3.11)
    • L
    Improper Access Control

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Improper Access Control in the hotspot/compiler component. An attacker can compromise data integrity.

    How to fix Improper Access Control?

    Upgrade org.graalvm.sdk:graal-sdk to version 21.3.10, 22.0.1 or higher.

    [,21.3.10)[22.0.0,22.0.1)
    • L
    Denial of Service (DoS)

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Denial of Service (DoS) in the hotspot/runtime component.

    How to fix Denial of Service (DoS)?

    Upgrade org.graalvm.sdk:graal-sdk to version 21.3.10, 22.0.1 or higher.

    [,21.3.10)[22.0.0,22.0.1)
    • L
    Information Exposure

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Information Exposure due to a flaw in the Compiler component. An attacker can achieve unauthorized read access to a subset of accessible data by exploiting this vulnerability through network access via multiple protocols. This vulnerability is challenging to exploit without proper authentication.

    How to fix Information Exposure?

    Upgrade org.graalvm.sdk:graal-sdk to version 17.0.11, 21.0.3, 22.0.1 or higher.

    [17.0.0,17.0.11)[21.0.0,21.0.3)[22.0.0,22.0.1)
    • L
    Access Control Bypass

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Access Control Bypass in the JavaFX media component, when running untrusted code.

    How to fix Access Control Bypass?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.13, 21.3.9 or higher.

    [,20.3.13)[21.0.0,21.3.9)
    • L
    Information Exposure

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Information Exposure via the JavaFX component, when running untrusted code.

    How to fix Information Exposure?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.13, 21.3.9 or higher.

    [,20.3.13)[21.0.0,21.3.9)
    • M
    Improper Input Validation

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Improper Input Validation due to a flaw in the JVM class file verifier in the hotspot/runtime component. An attacker can execute unverified bytecode by crafting a malicious input that bypasses the verification process.

    Note: This vulnerability can only be exploited by supplying data to APIs in the specified Component without using Untrusted Java Web Start applications or Untrusted Java applets, such as through a web service.

    How to fix Improper Input Validation?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.13, 21.3.9, 23.0.0 or higher.

    [,20.3.13)[21.0.0,21.3.9)[22.0.0,23.0.0)
    • H
    Improper Privilege Management

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Improper Privilege Management in the hotspot/compiler component.

    Note This is only exploitable if the attacker utilizes APIs in the specified component, such as through a web service that provides data to the APIs. Additionally, the vulnerability affects Java deployments that execute untrusted code, relying on the Java sandbox for security.

    How to fix Improper Privilege Management?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.13, 21.3.9, 22.3.5 or higher.

    [,20.3.13)[21.0.0,21.3.9)[22.0.0,22.3.5)
    • M
    Insertion of Sensitive Information into Log File

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Insertion of Sensitive Information into Log File in the security-libs/javax.xml.crypto component. An attacker with local access could access private keys.

    Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).

    How to fix Insertion of Sensitive Information into Log File?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.13, 21.3.9, 23.0.0 or higher.

    [,20.3.13)[21.0.0,21.3.9)[22.0.0,23.0.0)
    • M
    Improper Input Validation

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Improper Input Validation due to a range check loop optimization issue in the hotspot/compiler component. An attacker can obtain sensitive information without authorization by exploiting the improper input validation.

    Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.

    How to fix Improper Input Validation?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.13, 21.3.9, 23.0.0 or higher.

    [,20.3.13)[21.0.0,21.3.9)[22.0.0,23.0.0)
    • M
    Information Exposure

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Information Exposure in the core-libs/javax.script component.

    Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).

    How to fix Information Exposure?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.13, 21.3.9, 22.3.5 or higher.

    [,20.3.13)[21.0.0,21.3.9)[22.0.0,22.3.5)
    • H
    Improper Privilege Management

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Improper Privilege Management in the security-libs/java.security component.

    Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).

    How to fix Improper Privilege Management?

    Upgrade org.graalvm.sdk:graal-sdk to version 21.3.9, 22.3.5 or higher.

    [,21.3.9)[22.0.0,22.3.5)
    • H
    Covert Timing Channel

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Covert Timing Channel in the security-libs/java.security component. An attacker can recover ciphertexts via a side-channel attack by exploiting the Marvin security flaw.

    Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).

    How to fix Covert Timing Channel?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.13, 21.3.9, 23.0.0 or higher.

    [,20.3.13)[21.0.0,21.3.9)[22.0.0,23.0.0)
    • L
    Improper Privilege Management

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Improper Privilege Management via the JavaFX component.

    Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).

    How to fix Improper Privilege Management?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.13, 21.3.9 or higher.

    [,20.3.13)[21.0.0,21.3.9)
    • L
    Buffer Overflow

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Buffer Overflow in LoadVectorMaskedNode::Ideal() in the hotspot compiler, when running unstrusted code.

    Note: This vulnerability is only exploitable when AVX-512 is enabled (-XX:UseAVX=3).

    How to fix Buffer Overflow?

    Upgrade org.graalvm.sdk:graal-sdk to version 21.0.1 or higher.

    [21.0.0,21.0.1)
    • M
    Denial of Service (DoS)

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Denial of Service (DoS) in security-libs/javax.net.ssl, when running untrusted code.

    How to fix Denial of Service (DoS)?

    Upgrade org.graalvm.sdk:graal-sdk to version 21.1.0 or higher.

    [17.0.0,21.1.0)
    • L
    Denial of Service (DoS)

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Denial of Service (DoS). Difficult to exploit vulnerability allows unauthenticated attackers with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK.

    Note:

    This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.

    How to fix Denial of Service (DoS)?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.11, 21.3.7, 22.3.3 or higher.

    [20.0.0,20.3.11)[21.0.0,21.3.7)[22.0.0,22.3.3)
    • L
    Information Exposure

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Information Exposure in the hotspot/compiler component.

    Note: This vulnerability can be exploited by using APIs in the specified component, e.g. through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.

    How to fix Information Exposure?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.11, 21.3.7, 22.3.3 or higher.

    [20.0.0,20.3.11)[21.0.0,21.3.7)[22.0.0,22.3.3)
    • L
    Information Exposure

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Information Exposure in the hotspot/compiler component.

    Note: This vulnerability can be exploited by using APIs in the specified component, e.g. through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.

    How to fix Information Exposure?

    Upgrade org.graalvm.sdk:graal-sdk to version 21.3.7, 22.3.3 or higher.

    [21.0.0,21.3.7)[22.0.0,22.3.3)
    • M
    Improper Access Control

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Improper Access Control which allows unauthenticated attackers with logon to the infrastructure executes to compromise the product. Exploiting this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK accessible data.

    Note:

    1. This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code from the internet) and rely on the Java sandbox for security.

    2. This vulnerability does not apply to Java deployments, typically in servers that load and run only trusted code (e.g., code installed by an administrator).

    How to fix Improper Access Control?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.11, 21.3.7, 22.3.3 or higher.

    [20.0.0,20.3.11)[21.0.0,21.3.7)[22.0.0,22.3.3)
    • L
    Access Restriction Bypass

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Access Restriction Bypass in the Networking component, which allows unauthenticated attackers with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition, Oracle GraalVM for JDK. Exploiting this vulnerability can result in unauthorized update, insert or delete access to accessible data.

    Note:

    1. This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code from the internet) and rely on the Java sandbox for security.

    2)This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).

    How to fix Access Restriction Bypass?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.11, 21.3.7, 22.3.3 or higher.

    [20.0.0,20.3.11)[21.0.0,21.3.7)[22.0.0,22.3.3)
    • L
    Access Restriction Bypass

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Access Restriction Bypass in the core-libs/java.io component. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access.

    Note: This vulnerability can be exploited by using APIs in the specified component, e.g. through a web service that supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security.

    How to fix Access Restriction Bypass?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.11, 21.3.7, 22.3.3 or higher.

    [20.0.0,20.3.11)[21.0.0,21.3.7)[22.0.0,22.3.3)
    • L
    Improper Neutralization of Null Byte or NUL Character

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Improper Neutralization of Null Byte or NUL Character resulting in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data.

    Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs.

    How to fix Improper Neutralization of Null Byte or NUL Character?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.10, 21.3.6, 22.3.2 or higher.

    [,20.3.10)[21.0.0,21.3.6)[22.0.0,22.3.2)
    • M
    Improper Input Validation

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Improper Input Validation due to a Swing HTML parsing issue, resulting in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data.

    Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs.

    How to fix Improper Input Validation?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.10, 21.3.6, 22.3.2 or higher.

    [,20.3.10)[21.0.0,21.3.6)[22.0.0,22.3.2)
    • L
    Improper Input Validation

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Improper Input Validation resulting in unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM Enterprise Edition accessible data.

    Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs.

    How to fix Improper Input Validation?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.10, 21.3.6, 22.3.2 or higher.

    [,20.3.10)[21.0.0,21.3.6)[22.0.0,22.3.2)
    • M
    Denial of Service (DoS)

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Denial of Service (DoS) certificate validation issue in TLS session negotiation. Difficult to exploit vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS).

    Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs.

    How to fix Denial of Service (DoS)?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.10, 21.3.6, 22.3.2 or higher.

    [,20.3.10)[21.0.0,21.3.6)[22.0.0,22.3.2)
    • L
    Remote Code Execution (RCE)

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Remote Code Execution (RCE) incorrect handling of NULL characters in ProcessBuilder. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of accessible data.

    Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator).

    How to fix Remote Code Execution (RCE)?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.10, 21.3.6, 22.3.2 or higher.

    [,20.3.10)[21.0.0,21.3.6)[22.0.0,22.3.2)
    • H
    Information Exposure

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Information Exposure. Improper connection handling during TLS handshake. Difficult to exploit vulnerability allows unauthenticated attacker with network access via TLS to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all accessible data as well as unauthorized access to critical data or complete access to all accessible data.

    Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs.

    How to fix Information Exposure?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.10, 21.3.6, 22.3.2 or higher.

    [,20.3.10)[21.0.0,21.3.6)[22.0.0,22.3.2)
    • M
    Information Exposure

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Information Exposure. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all accessible data.

    Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs.

    How to fix Information Exposure?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.10, 21.3.6, 22.3.2 or higher.

    [,20.3.10)[21.0.0,21.3.6)[22.0.0,22.3.2)
    • M
    Out-of-bounds Write

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Out-of-bounds Write. A flaw was found in the way the Hotspot component of OpenJDK processed classes with _fields that needed to be written to in Rewriter::scan_method().

    How to fix Out-of-bounds Write?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.5, 21.3.1 or higher.

    [,20.3.5)[21.0.0,21.3.1)
    • L
    Deserialization of Untrusted Data

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Deserialization of Untrusted Data the ObjectInputStream class implementation in the Serialization component did not check superclasses against the deserialization filter (defined via jdk.serialFilter system or security property) in cases when those classes were available locally and not included in the serialized stream. A specially-crafted serialized stream could possibly use this flaw to bypass class deserialization restrictions.

    How to fix Deserialization of Untrusted Data?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.5, 21.3.1 or higher.

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Information Exposure

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Information Exposure. TransformerImpl class implementation in the JAXP component did not properly check access restrictions when performing URI resolution. This could possibly lead to information disclosure when performing XSLT transformations.

    How to fix Information Exposure?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.5, 21.3.1 or higher.

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Allocation of Resources Without Limits or Throttling

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling the implementation of the IdentityHashMap class doesn't properly validate the value of its size attribute when creating object instances from a serialized form. A specially-crafted input could cause a Java application to use an excessive amount of memory when deserialized.

    How to fix Allocation of Resources Without Limits or Throttling?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.5, 21.3.1 or higher.

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Allocation of Resources Without Limits or Throttling

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling. A flaw was found in the way the TIFFNullDecompressor class implementation in the ImageIO component performs reading of uncompressed TIFF files. A specially-crafted TIFF image could cause the decompressor to create image objects with an inconsistent state due to failure to fully read the image.

    How to fix Allocation of Resources Without Limits or Throttling?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.5, 21.3.1 or higher.

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Infinite loop

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Infinite loop. A flaw was found in the way the XMLEntityScanner and XML11EntityScanner classes in the JAXP component handles and normalized newlines in XML entities. A specially-crafted XML document could cause a Java application to enter an infinite loop when parsed.

    How to fix Infinite loop?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.5, 21.3.1 or higher.

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Information Exposure

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Information Exposure. The XMLEntityManager class implementation in the JAXP component doesn't properly perform access checks. A Java application using a SAX XML parser in certain configurations could be tricked into disclosing information when parsing a specially-crafted XML file.

    How to fix Information Exposure?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.5, 21.3.1 or higher.

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Integer Overflow or Wraparound

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Integer Overflow or Wraparound. A flaw was found in the BMPImageReader class implementation in the ImageIO component, which allows a specially-crafted BMP image to bypass previously applied protection and cause a Java application to allocate an excessive amount of memory when opened.

    Note:

    this is due to an incomplete fix for CVE-2021-35586.

    How to fix Integer Overflow or Wraparound?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.5, 21.3.1 or higher.

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Improper Input Validation

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Improper Input Validation. It was discovered that the StringBuffer and StringBuilder classes implementation in the Libraries component failed to properly validate the value of the count attribute during object deserialization. A specially-crafted input could cause a Java application to misbehave because of StringBuffer or StringBuilder object instances in an inconsistent state.

    How to fix Improper Input Validation?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.5, 21.3.1 or higher.

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Improper Input Validation

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Improper Input Validation. The ObjectInputStream class implementation in the Serialization component doesn't sufficiently validate data read from the input serialized stream when reading serialized exceptions. A specially-crafted serialized stream could use this flaw to bypass certain deserialization restrictions (defined via jdk.serialFilter system or security property).

    How to fix Improper Input Validation?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.5, 21.3.1 or higher.

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Uncaught Exception

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Uncaught Exception. A flaw was found in the Pattern class implementation in the Libraries component. A specially crafted input could cause the Pattern class to raise an unexpected exception while performing regular expression matching, possibly causing a Java application using the class to misbehave.

    How to fix Uncaught Exception?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.5, 21.3.1 or higher.

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Allocation of Resources Without Limits or Throttling

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling. A flaw was found in the way the TIFFFaxDecompressor, TIFFLZWDecompressor, and TIFFPackBitsDecompressor classes implementations in the ImageIO component of OpenJDK handled memory allocations when processing TIFF images. A specially-crafted TIFF image with a small size could cause a Java application to allocate an excessive amount of memory when opened.

    How to fix Allocation of Resources Without Limits or Throttling?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.5, 21.3.1 or higher.

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Integer Overflow or Wraparound

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Integer Overflow or Wraparound. A flaw was found in the way the Hotspot component of OpenJDK handled array indexes on 64-bit x86 platform. A large index could trigger a displacement overflow in LIRGenerator::emit_array_address, possibly leading to access at an invalid array position.

    How to fix Integer Overflow or Wraparound?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.5, 21.3.1 or higher.

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Allocation of Resources Without Limits or Throttling

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling. A flaw was found in the way the BMPImageReader class implementation in the ImageIO performs memory allocations when reading palette information from BMP images. A specially-crafted BMP file could cause a Java application to consume an excessive amount of memory when opened.

    How to fix Allocation of Resources Without Limits or Throttling?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.5, 21.3.1 or higher.

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Allocation of Resources Without Limits or Throttling

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling. A flaw was found in the way the Attributes class in the Libraries component performs reading of attributes with very long values from the JAR file manifests. A specially-crafted JAR archive could cause a Java application reading its manifest to use an excessive amount of system resources and hang.

    How to fix Allocation of Resources Without Limits or Throttling?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.5, 21.3.1 or higher.

    [,20.3.5)[21.0.0,21.3.1)
    • M
    Improper Access Control

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Improper Access Control. It allows unauthenticated attacker with network access via TLS to compromise Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service.

    How to fix Improper Access Control?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.4, 21.3.0 or higher.

    [,20.3.4)[21.0.0,21.3.0)
    • M
    Access Restriction Bypass

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Access Restriction Bypass via incorrect principal selection when using Kerberos Constrained Delegation result in unauthorized access to critical data or complete access to all GraalVM accessible data.

    How to fix Access Restriction Bypass?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.4, 21.3.0 or higher.

    [,20.3.4)[21.0.0,21.3.0)
    • L
    Timing Attack

    org.graalvm.sdk:graal-sdk is a high-performance JDK distribution designed to accelerate the execution of applications written in Java and other JVM languages along with support for JavaScript, Ruby, Python, and a number of other popular languages.

    Affected versions of this package are vulnerable to Timing Attack. It was discovered that the TLS implementation in the JSSE component of OpenJDK used non-constant comparisons when checking various data (such as session identifiers or verification data blocks) during TLS handshakes. A malicious TLS client could possibly use this flaw to recover that data by observing timing differences in processing of various inputs.

    How to fix Timing Attack?

    Upgrade org.graalvm.sdk:graal-sdk to version 20.3.4, 21.3.0 or higher.

    [,20.3.4)[21.0.0,21.3.0)