{
  "document": {
    "aggregate_severity": {
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "Upgrade to openjdk-11.0.27+6. The following CVEs were fixed:\n- CVE-2025-30698: fix buffered image handling to avoid unauthorized\n  access to accessible data\n- CVE-2025-30691: improve compiler transformations to avoid unauthorized\n  access to accessible data\n- CVE-2024-21144: invalid header validation leads to Pack200 excessive\n  loading time\n- CVE-2024-21147: out-of-bounds array index in range check elimination\n- CVE-2024-21138: infinite loop vunlerability in SymbolTable\n- CVE-2024-21131: UTF8 size overflow\n- CVE-2024-21235: incorrect range check because of integer conversion\n  error in LoopNode\n- CVE-2024-21140: int overflow/underflow in range check elimination\n- CVE-2024-21217: out-of-memory because of unbounded allocation in\n  MessageFormat\n- CVE-2024-21210: integer overflow in array indexing in SuperWord\n- CVE-2024-21145: out-of-bounds access in MaskFill\n- CVE-2024-21208: improper handling of maxHeaderSize in HTTP client\n- CVE-2025-21502: enhance array handling",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/almalinux9.2esu/advisories/2025/clsa-2025_1752246531.json"
      },
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531"
      }
    ],
    "tracking": {
      "current_release_date": "2026-02-16T09:29:46Z",
      "generator": {
        "date": "2026-02-16T09:29:46Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2025:1752246531",
      "initial_release_date": "2025-07-11T15:10:41Z",
      "revision_history": [
        {
          "date": "2025-07-11T15:10:41Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-02-16T09:29:46Z",
          "number": "2",
          "summary": "Update document"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "java-11-openjdk: Fix of 13 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "AlmaLinux 9.2",
                "product": {
                  "name": "AlmaLinux 9.2",
                  "product_id": "AlmaLinux-9.2",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:almalinux:almalinux:9.2:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "AlmaLinux"
          }
        ],
        "category": "vendor",
        "name": "AlmaLinux OS Foundation"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                "product": {
                  "name": "java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                  "product_id": "java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/java-11-openjdk-javadoc@11.0.27.0.6-1.el9.tuxcare.els1?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                "product": {
                  "name": "java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                  "product_id": "java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/java-11-openjdk-src@11.0.27.0.6-1.el9.tuxcare.els1?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                "product": {
                  "name": "java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                  "product_id": "java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/java-11-openjdk-devel@11.0.27.0.6-1.el9.tuxcare.els1?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                "product": {
                  "name": "java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                  "product_id": "java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/java-11-openjdk-jmods@11.0.27.0.6-1.el9.tuxcare.els1?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                "product": {
                  "name": "java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                  "product_id": "java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/java-11-openjdk-javadoc-zip@11.0.27.0.6-1.el9.tuxcare.els1?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                "product": {
                  "name": "java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                  "product_id": "java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/java-11-openjdk-static-libs@11.0.27.0.6-1.el9.tuxcare.els1?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                "product": {
                  "name": "java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                  "product_id": "java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/java-11-openjdk-demo@11.0.27.0.6-1.el9.tuxcare.els1?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                "product": {
                  "name": "java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                  "product_id": "java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/java-11-openjdk-headless@11.0.27.0.6-1.el9.tuxcare.els1?arch=x86_64&epoch=1"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                "product": {
                  "name": "java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                  "product_id": "java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/java-11-openjdk@11.0.27.0.6-1.el9.tuxcare.els1?arch=x86_64&epoch=1"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
        },
        "product_reference": "java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
        },
        "product_reference": "java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
        },
        "product_reference": "java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
        },
        "product_reference": "java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
        },
        "product_reference": "java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
        },
        "product_reference": "java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
        },
        "product_reference": "java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
        },
        "product_reference": "java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
        },
        "product_reference": "java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-21502",
      "cwe": {
        "id": "CWE-195",
        "name": "Signed to Unsigned Conversion Error"
      },
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot).  Supported versions that are affected are Oracle Java SE: 8u431-perf, 11.0.25, 17.0.13, 21.0.5, 23.0.1; Oracle GraalVM for JDK: 17.0.13, 21.0.5, 23.0.1; Oracle GraalVM Enterprise Edition: 20.3.16 and  21.3.12. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as  unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-21502"
        }
      ],
      "release_date": "2025-01-21T20:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-07-11T15:08:53Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531",
          "product_ids": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2024-21208",
      "cwe": {
        "id": "CWE-130",
        "name": "Improper Handling of Length Parameter Inconsistency"
      },
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Networking).  Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4, 23; Oracle GraalVM for JDK: 17.0.12, 21.0.4, 23; Oracle GraalVM Enterprise Edition: 20.3.15 and  21.3.11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-21208"
        }
      ],
      "release_date": "2024-10-15T20:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-07-11T15:08:53Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531",
          "product_ids": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ]
    },
    {
      "cve": "CVE-2024-21145",
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D).  Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and  21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as  unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-21145"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20240719-0008/",
          "url": "https://security.netapp.com/advisory/ntap-20240719-0008/"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujul2024.html",
          "url": "https://www.oracle.com/security-alerts/cpujul2024.html"
        }
      ],
      "release_date": "2024-07-16T23:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-07-11T15:08:53Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531",
          "product_ids": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2024-21210",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in Oracle Java SE (component: Hotspot).  Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4 and  23. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Java SE accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-21210"
        }
      ],
      "release_date": "2024-10-15T20:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-07-11T15:08:53Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531",
          "product_ids": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ]
    },
    {
      "cve": "CVE-2025-30698",
      "cwe": {
        "id": "CWE-122",
        "name": "Heap-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D).  Supported versions that are affected are Oracle Java SE: 8u441, 8u441-perf, 11.0.26, 17.0.14, 21.0.6, 24; Oracle GraalVM for JDK: 17.0.14, 21.0.6, 24; Oracle GraalVM Enterprise Edition: 20.3.17 and  21.3.13. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as  unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 5.6 (Confidentiality, Integrity and Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-30698"
        }
      ],
      "release_date": "2025-04-15T21:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-07-11T15:08:53Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531",
          "product_ids": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2024-21217",
      "cwe": {
        "id": "CWE-789",
        "name": "Memory Allocation with Excessive Size Value"
      },
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Serialization).  Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4, 23; Oracle GraalVM for JDK: 17.0.12, 21.0.4, 23; Oracle GraalVM Enterprise Edition: 20.3.15 and  21.3.11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-21217"
        }
      ],
      "release_date": "2024-10-15T20:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-07-11T15:08:53Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531",
          "product_ids": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ]
    },
    {
      "cve": "CVE-2024-21140",
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot).  Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and  21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as  unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-21140"
        }
      ],
      "release_date": "2024-07-16T20:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-07-11T15:08:53Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531",
          "product_ids": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2024-21235",
      "cwe": {
        "id": "CWE-195",
        "name": "Signed to Unsigned Conversion Error"
      },
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot).  Supported versions that are affected are Oracle Java SE: 8u421, 8u421-perf, 11.0.24, 17.0.12, 21.0.4, 23;   Oracle GraalVM for JDK: 17.0.12, 21.0.4, 23;   Oracle GraalVM Enterprise Edition: 20.3.15 and  21.3.11. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as  unauthorized read access to a subset of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-21235"
        }
      ],
      "release_date": "2024-10-15T20:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-07-11T15:08:53Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531",
          "product_ids": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2024-21131",
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot).  Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and  21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-21131"
        }
      ],
      "release_date": "2024-07-16T20:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-07-11T15:08:53Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531",
          "product_ids": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ]
    },
    {
      "cve": "CVE-2024-21138",
      "cwe": {
        "id": "CWE-835",
        "name": "Loop with Unreachable Exit Condition ('Infinite Loop')"
      },
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot).  Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and  21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 3.7 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-21138"
        }
      ],
      "release_date": "2024-07-16T20:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-07-11T15:08:53Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531",
          "product_ids": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ]
    },
    {
      "cve": "CVE-2025-30691",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')"
      },
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in Oracle Java SE (component: Compiler).  Supported versions that are affected are Oracle Java SE: 21.0.6, 24; Oracle GraalVM for JDK: 21.0.6 and  24. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE.  Successful attacks of this vulnerability can result in  unauthorized update, insert or delete access to some of Oracle Java SE accessible data as well as  unauthorized read access to a subset of Oracle Java SE accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 4.8 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-30691"
        }
      ],
      "release_date": "2025-04-15T21:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-07-11T15:08:53Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531",
          "product_ids": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2024-21147",
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Hotspot).  Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23, 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM for JDK: 17.0.11, 21.0.3, 22.0.1; Oracle GraalVM Enterprise Edition: 20.3.14 and  21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in  unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data as well as  unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.4 (Confidentiality and Integrity impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-21147"
        }
      ],
      "release_date": "2024-07-16T20:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-07-11T15:08:53Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531",
          "product_ids": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ]
    },
    {
      "cve": "CVE-2024-21144",
      "notes": [
        {
          "category": "description",
          "text": "Vulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Concurrency).  Supported versions that are affected are Oracle Java SE: 8u411, 8u411-perf, 11.0.23; Oracle GraalVM Enterprise Edition: 20.3.14 and  21.3.10. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM Enterprise Edition.  Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Oracle Java SE, Oracle GraalVM Enterprise Edition. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability does not apply to Java deployments, typically in servers, that load and run only trusted code (e.g., code installed by an administrator). CVSS 3.1 Base Score 3.7 (Availability impacts).  CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L).",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
          "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-21144"
        },
        {
          "category": "external",
          "summary": "https://security.netapp.com/advisory/ntap-20240719-0007/",
          "url": "https://security.netapp.com/advisory/ntap-20240719-0007/"
        },
        {
          "category": "external",
          "summary": "https://www.oracle.com/security-alerts/cpujul2024.html",
          "url": "https://www.oracle.com/security-alerts/cpujul2024.html"
        }
      ],
      "release_date": "2024-07-16T23:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2025-07-11T15:08:53Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531",
          "product_ids": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2025:1752246531"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:java-11-openjdk-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-demo-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-devel-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-headless-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-javadoc-zip-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-jmods-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-src-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64",
            "AlmaLinux-9.2:java-11-openjdk-static-libs-1:11.0.27.0.6-1.el9.tuxcare.els1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ]
    }
  ]
}