First published: Mon Jul 15 2024(Updated: )
A RangeCheckElimination array index overflow was found in OpenJDK. Oracle CPU advisory - July 2024: <a href="https://www.oracle.com/security-alerts/cpujul2024.html#AppendixJAVA">https://www.oracle.com/security-alerts/cpujul2024.html#AppendixJAVA</a>
Credit: secalert_us@oracle.com secalert_us@oracle.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openjdk-11 | 11.0.24+8-2~deb11u1 11.0.26+4-1~deb11u1 11.0.26+4-1 | |
debian/openjdk-17 | 17.0.12+7-2~deb11u1 17.0.14+7-1~deb11u1 17.0.13+11-2~deb12u1 17.0.14+7-1~deb12u1 17.0.14+7-1 | |
debian/openjdk-21 | 21.0.6+7-1 | |
debian/openjdk-8 | 8u442-ga-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-21147 has a critical severity rating due to its potential for exploitation in Java SE.
To fix CVE-2024-21147, update to the latest available version of OpenJDK as specified in the advisory.
CVE-2024-21147 affects various versions of IBM Storage Scale and multiple OpenJDK packages.
The recommended OpenJDK versions to mitigate CVE-2024-21147 include 11.0.24+8-2, 17.0.12+7-2, and 21.0.5+11-1.
As of now, there are no publicly known exploits for CVE-2024-21147, but it is still advisable to patch the vulnerability.