First published: Mon Oct 19 2020(Updated: )
It was discovered that the implementation of the Proxy class in the Serialization component of OpenJDK could trigger an out-of-memory condition when deserializing Proxy class objects with many interfaces. A specially-crafted input could cause a Java application to use an excessive amount of memory when deserialized. The patch for this issue adds a new system property jdk.serialProxyInterfaceLimit that can be used to reduce the limit for Proxy interfaces from the default of 65535 and hence better protect against excessive memory usage.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK 17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1889271 is high due to its potential to cause out-of-memory conditions in Java applications.
To fix REDHAT-BUG-1889271, you should update your OpenJDK to the latest version that addresses this vulnerability.
REDHAT-BUG-1889271 specifically affects Oracle OpenJDK, especially versions around 17.
The risks associated with REDHAT-BUG-1889271 include potential application crashes and service interruptions due to excessive memory usage.
Yes, a specially-crafted input can be used remotely to exploit REDHAT-BUG-1889271, leading to potential denial of service.