Heap-based Buffer Overflow Affecting java-21-ibm-semeru-certified-jdk package, versions <1:21.0.7.0.6-1.el10_0


Severity

Recommended
0.0
high
0
10

Based on CentOS security rating.

Threat Intelligence

EPSS
0.04% (13th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-CENTOS10-JAVA21IBMSEMERUCERTIFIEDJDK-10297750
  • published4 Jun 2025
  • disclosed14 May 2025

Introduced: 14 May 2025

CVE-2025-2900  (opens in a new tab)
CWE-122  (opens in a new tab)

How to fix?

Upgrade Centos:10 java-21-ibm-semeru-certified-jdk to version 1:21.0.7.0.6-1.el10_0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream java-21-ibm-semeru-certified-jdk package and not the java-21-ibm-semeru-certified-jdk package as distributed by Centos. See How to fix? for Centos:10 relevant fixed versions and status.

IBM Semeru Runtime 8.0.302.0 through 8.0.442.0, 11.0.12.0 through 11.0.26.0, 17.0.0.0 through 17.0.14.0, and 21.0.0.0 through 12.0.6.0 is vulnerable to a denial of service caused by a buffer overflow and subsequent crash, due to a defect in its native AES/CBC encryption implementation.

CVSS Base Scores

version 3.1