First published: Sun Apr 14 2024(Updated: )
A flaw was found in the C2 compiler in the Hotspot component of OpenJDK. C2 compilation fails with "Exceeded _node_regs array" due to an improper size validation and out-of-bounds array access, potentially resulting in a corruption of the JVM memory. Upstream OpenJDK issue: <a href="https://bugs.openjdk.org/browse/JDK-8317507">https://bugs.openjdk.org/browse/JDK-8317507</a>
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openjdk-11 | 11.0.24+8-2~deb11u1 11.0.26+4-1~deb11u1 11.0.26+4-1 | |
debian/openjdk-17 | 17.0.12+7-2~deb11u1 17.0.14+7-1~deb11u1 17.0.13+11-2~deb12u1 17.0.14+7-1~deb12u1 17.0.14+7-1 | |
debian/openjdk-21 | 21.0.6+7-1 | |
debian/openjdk-8 | 8u442-ga-1 | |
IBM Spectrum Protect | <=8.1.0.0 - 8.1.23.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21094 is considered a high severity vulnerability due to the potential for JVM memory corruption.
To fix CVE-2024-21094, you should update OpenJDK to the recommended patched versions for your system.
CVE-2024-21094 affects various versions of OpenJDK including versions 8, 11, 17, and 21 up to specific builds.
CVE-2024-21094 is an out-of-bounds access vulnerability found in the C2 compiler of the Hotspot component of OpenJDK.
CVE-2024-21094 impacts IBM Storage Protect Backup-Archive Client as well as several OpenJDK packages on Debian.