Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 8u451, 8u451-perf, 11.0.27, 17.0.15, 21.0.7, 24.0.1; Oracle GraalVM for JDK: 17.0.15, 21.0.7 and 24.0.1; Oracle GraalVM Enterprise Edition: 21.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in takeover of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
Advisories
Source ID Title
Debian DLA Debian DLA DLA-4248-1 openjdk-11 security update
Debian DLA Debian DLA DLA-4275-1 openjdk-17 security update
Debian DSA Debian DSA DSA-5972-1 openjdk-17 security update
EUVD EUVD EUVD-2025-21474 Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 8u451, 8u451-perf, 11.0.27, 17.0.15, 21.0.7, 24.0.1; Oracle GraalVM for JDK: 17.0.15, 21.0.7 and 24.0.1; Oracle GraalVM Enterprise Edition: 21.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in takeover of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
Ubuntu USN Ubuntu USN USN-7667-1 OpenJDK 8 vulnerabilities
Ubuntu USN Ubuntu USN USN-7668-1 OpenJDK 21 vulnerabilities
Ubuntu USN Ubuntu USN USN-7669-1 OpenJDK 24 vulnerabilities
Ubuntu USN Ubuntu USN USN-7672-1 CRaC JDK 17 vulnerabilities
Ubuntu USN Ubuntu USN USN-7673-1 CRaC JDK 21 vulnerabilities
Ubuntu USN Ubuntu USN USN-7674-1 OpenJDK 11 vulnerabilities
Ubuntu USN Ubuntu USN USN-7690-1 OpenJDK 17 vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 04 Aug 2025 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Oracle graalvm
Oracle jdk
Oracle jre
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:a:oracle:graalvm:21.3.14:*:*:*:enterprise:*:*:*
cpe:2.3:a:oracle:graalvm_for_jdk:17.0.15:*:*:*:*:*:*:*
cpe:2.3:a:oracle:graalvm_for_jdk:21.0.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:graalvm_for_jdk:24.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:update451:*:*:-:*:*:*
cpe:2.3:a:oracle:jdk:1.8.0:update451:*:*:enterprise_performance_pack:*:*:*
cpe:2.3:a:oracle:jdk:11.0.27:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:17.0.15:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:21.0.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jdk:24.0.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:1.8.0:update451:*:*:-:*:*:*
cpe:2.3:a:oracle:jre:1.8.0:update451:*:*:enterprise_performance_pack:*:*:*
cpe:2.3:a:oracle:jre:11.0.27:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:17.0.15:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:21.0.7:*:*:*:*:*:*:*
cpe:2.3:a:oracle:jre:24.0.1:*:*:*:*:*:*:*
Vendors & Products Oracle graalvm
Oracle jdk
Oracle jre

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00043}


Wed, 16 Jul 2025 00:15:00 +0000

Type Values Removed Values Added
Title openjdk: Glyph out-of-memory access and crash (Oracle CPU 2025-07)
Weaknesses CWE-122
References
Metrics threat_severity

None

threat_severity

Important


Tue, 15 Jul 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 15 Jul 2025 19:45:00 +0000

Type Values Removed Values Added
Description Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: 2D). Supported versions that are affected are Oracle Java SE: 8u451, 8u451-perf, 11.0.27, 17.0.15, 21.0.7, 24.0.1; Oracle GraalVM for JDK: 17.0.15, 21.0.7 and 24.0.1; Oracle GraalVM Enterprise Edition: 21.3.14. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in takeover of Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 8.1 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H).
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: oracle

Published:

Updated: 2025-07-16T03:56:14.402Z

Reserved: 2025-06-11T22:56:56.114Z

Link: CVE-2025-50106

cve-icon Vulnrichment

Updated: 2025-07-15T20:22:58.192Z

cve-icon NVD

Status : Analyzed

Published: 2025-07-15T20:15:47.013

Modified: 2025-08-04T21:20:26.203

Link: CVE-2025-50106

cve-icon Redhat

Severity : Important

Publid Date: 2025-07-15T20:00:00Z

Links: CVE-2025-50106 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2025-07-16T21:35:19Z