First published: Thu Jan 11 2024(Updated: )
A flaw was found in the loop optimizations performed by the Hotspot component of OpenJDK when generating range check predicates. An untrusted Java application or applet could use this flaw to corrupt JVM memory and cause it to crash or, possibly, execute arbitrary code, bypassing Java sandbox restrictions.
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Cognos Controller | <=11.0.0 - 11.0.1 | |
debian/openjdk-11 | 11.0.24+8-2~deb11u1 11.0.26+4-1~deb11u1 11.0.26+4-1 | |
debian/openjdk-17 | 17.0.12+7-2~deb11u1 17.0.13+11-1~deb11u1 17.0.13+11-2~deb12u1 17.0.14+7-1 | |
debian/openjdk-21 | 21.0.6+7-1 | |
debian/openjdk-8 | 8u432-b06-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-20921 is classified as a high-severity vulnerability due to its potential to allow arbitrary code execution.
To fix CVE-2024-20921, upgrade to the latest versions of OpenJDK or affected IBM Cognos Controller as specified in the vendor's advisory.
CVE-2024-20921 affects OpenJDK versions 8, 11, 17, and 21 prior to the specified remedied versions.
Exploitation of CVE-2024-20921 can lead to corruption of JVM memory, application crashes, or the execution of arbitrary code.
Yes, IBM Cognos Controller versions 11.0.0 to 11.0.1 are vulnerable to CVE-2024-20921 and should be upgraded.