Search for packages
| purl | pkg:deb/debian/openjdk-21@21.0.3%2B9-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-2tju-1r8k-sbf9 | OpenJDK: C2 compilation fails with "Exceeded _node_regs array" (8317507) |
CVE-2024-21094
|
| VCID-5et1-ytak-xqh7 | OpenJDK: Excessive symbol length can lead to infinite loop (8319859) |
CVE-2024-21138
|
| VCID-76rb-sg3r-bqce | OpenJDK: potential UTF8 size overflow (8314794) |
CVE-2024-21131
|
| VCID-9urr-3gt2-mfhe | OpenJDK: long Exception message leading to crash (8319851) |
CVE-2024-21011
|
| VCID-h7n1-qfs3-v3fw | OpenJDK: HTTP/2 client improper reverse DNS lookup (8315708) |
CVE-2024-21012
|
| VCID-n71d-tx76-vbbd | OpenJDK: Out-of-bounds access in 2D image handling (8324559) |
CVE-2024-21145
|
| VCID-rggy-f3va-mfay | OpenJDK: RangeCheckElimination array index overflow (8323231) |
CVE-2024-21147
|
| VCID-zdra-bzqn-4ug9 | OpenJDK: integer overflow in C1 compiler address generation (8322122) |
CVE-2024-21068
|
| VCID-zgpr-3zft-zqgt | OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548) |
CVE-2024-21140
|