First published: Wed Jan 15 2020(Updated: )
It was discovered that the DatagramChannelImpl class in the Networking component of OpenJDK failed to completely enforce the limit of the number of datagram sockets (set using the sun.net.maxDatagramSockets system property) that can be created by a code running with the Java sandbox restrictions. An untrusted Java code could use this flaw to bypass the intended Java sandbox restriction.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK 17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1791284 is categorized as high due to the potential for denial of service attacks.
To fix REDHAT-BUG-1791284, upgrade to the patched version of Oracle OpenJDK that resolves this issue.
The vulnerability REDHAT-BUG-1791284 affects OpenJDK 17 and potentially earlier versions depending on system configurations.
No, REDHAT-BUG-1791284 specifically impacts applications running with Java sandbox restrictions.
Although REDHAT-BUG-1791284 is primarily a denial of service vulnerability, it may lead to indirect issues that could compromise system integrity.