First published: Thu Feb 29 2024(Updated: )
An issue in Clojure versions 1.20 to 1.12.0-alpha5 allows an attacker to cause a denial of service (DoS) via the clojure.core$partial$fn__5920 function.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.clojure:clojure | >=1.12.0-alpha1<1.12.0-alpha9 | 1.12.0-alpha9 |
maven/org.clojure:clojure | >=1.7.0<1.11.2 | 1.11.2 |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22871 has a severity rating that indicates it can cause a denial of service (DoS) in affected applications.
To fix CVE-2024-22871, you should upgrade to Clojure version 1.12.0-alpha9 or 1.11.2, or apply the appropriate patches for IBM Cognos Analytics.
CVE-2024-22871 affects Clojure versions 1.20 to 1.12.0-alpha5.
CVE-2024-22871 impacts the functionality of the clojure.core$partial$fn__5920 function, potentially leading to DoS.
CVE-2024-22871 can be exploited locally or remotely, allowing attackers to affect any JVM-based application that uses the vulnerable versions.