First published: Thu Jan 11 2024(Updated: )
A flaw was found in the way the Hotspot JVM class file verifier verified the correctness of bytecode in the loaded class files. An untrusted Java application or applet could use this flaw to bypass Java sandbox restrictions.
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Cognos Controller | <=11.0.0 - 11.0.1 | |
debian/openjdk-11 | 11.0.24+8-2~deb11u1 11.0.26+4-1~deb11u1 11.0.26+4-1 | |
debian/openjdk-17 | 17.0.12+7-2~deb11u1 17.0.14+7-1~deb11u1 17.0.13+11-2~deb12u1 17.0.14+7-1~deb12u1 17.0.14+7-1 | |
debian/openjdk-21 | 21.0.6+7-1 | |
debian/openjdk-8 | 8u442-ga-1 | |
Oracle GraalVM Enterprise Edition | =20.3.12 | |
Oracle GraalVM Enterprise Edition | =21.3.8 | |
Oracle GraalVM Enterprise Edition | =22.3.4 | |
Oracle GraalVM for JDK | =17.0.9 | |
Oracle GraalVM for JDK | =21.0.1 | |
Oracle OpenJDK 1.8.0 | =1.8.0-update391 | |
Oracle OpenJDK 1.8.0 | =1.8.0-update391 | |
Oracle OpenJDK 1.8.0 | =11.0.21 | |
Oracle OpenJDK 1.8.0 | =17.0.9 | |
Oracle OpenJDK 1.8.0 | =21.0.1 | |
Oracle JRE | =1.8.0-update391 | |
Oracle JRE | =1.8.0-update391 | |
Oracle JRE | =11.0.21 | |
Oracle JRE | =17.0.9 | |
Oracle JRE | =21.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20919 has a critical severity rating due to its potential to bypass Java sandbox restrictions.
To resolve CVE-2024-20919, update to the latest patched version of the affected software, such as OpenJDK or Oracle JDK.
CVE-2024-20919 impacts various versions of IBM Cognos Controller and multiple OpenJDK releases, including Oracle GraalVM.
Systems running untrusted Java applications or applets, particularly those with vulnerable versions of Java SE, are susceptible to CVE-2024-20919.
There is no verified workaround for CVE-2024-20919; updating to the latest versions is strongly recommended.