Lucene search

K
ibmIBMBC1765B57887E1E67235D77317FD567C88D516DC19C7862E5228DD73CE68D5F6
HistoryMay 30, 2024 - 2:06 p.m.

Security Bulletin: Multiple vulnerabilities affect IBM® Semeru Runtime

2024-05-3014:06:22
www.ibm.com
1
ibm semeru runtime
java se
vulnerabilities
openjdk
cve-2024-21085
cve-2024-21012
cve-2024-3933
eclipse openj9
buffer
arraycopy
github repositories
ibm support
apar numbers

5.3 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L

6.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.7%

Summary

This bulletin covers all applicable Java SE CVEs published by OpenJDK as part of their April 2024 Vulnerability Advisory, plus CVE-2024-3933. For more information please refer to OpenJDK’s April 2024 Vulnerability Advisory and the X-Force database entries referenced below.

Vulnerability Details

CVEID:CVE-2024-21085
**DESCRIPTION:**An unspecified vulnerability in Java SE related to the VM component could allow a remote attacker to cause low availability impacts.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/288000 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L)

CVEID:CVE-2024-21012
**DESCRIPTION:**An unspecified vulnerability in Java SE related to the Networking component could allow a remote attacker to cause high integrity impact.
CVSS Base score: 3.7
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/288019 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)

CVEID:CVE-2024-3933
**DESCRIPTION:**Eclipse Openj9 could allow a local authenticated attacker to bypass security restrictions, caused by the failure to restrict access to a buffer with an incorrect length value when executing an arraycopy sequence while the Concurrent Scavenge Garbage Collection cycle is active and the source and destination memory regions for arraycopy overlap. By sending a specially crafted request, an attacker could exploit this vulnerability to gain read and write to addresses beyond the end of the array range.
CVSS Base score: 5.3
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/292491 for the current score.
CVSS Vector: (CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L)

Affected Products and Versions

Affected Product(s) Version(s)
IBM Semeru Runtime 8.0.302.0 - 8.0.402.0
IBM Semeru Runtime 11.0.12.0 - 11.0.22.0
IBM Semeru Runtime 17.0.1.0 - 17.0.10.0
IBM Semeru Runtime 21.0.1.0 - 21.0.2.0

Note: CVE-2024-3933 is applicable to IBM Semeru Runtime on zLinux only.

Remediation/Fixes

8.0.412.0
11.0.23.0
17.0.11.0
21.0.3.0

IBM Semeru Runtime releases can be downloaded from the GitHub repositories for Semeru 8, Semeru 11, Semeru 17, and Semeru 21, and the IBM Semeru Developer Center.

IBM customers requiring an update for an SDK shipped with an IBM product should contact IBM support, and/or refer to the appropriate product security bulletin.

APAR numbers are as follows:

IJ50948 (CVE-2024-21085)
IJ50949 (CVE-2024-21012)
IJ51327 (CVE-2024-3933)

Workarounds and Mitigations

None

Affected configurations

Vulners
Node
ibmsemeru_runtimeMatchany
CPENameOperatorVersion
ibm semeru runtimeseqany

5.3 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:L

6.8 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.7%