First published: Fri Oct 15 2021(Updated: )
An inifinte loop flaw was found in the HttpsServer class implementation in the JSSE component of OpenJDK. A remote attacker could possibly use this flaw to cause a Java application implementing HTTPS server functionality to loop during the TLS session closing and consume an excessive amount of CPU time.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK 17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability REDHAT-BUG-2014508 has a high severity rating due to the potential for excessive CPU consumption.
To fix REDHAT-BUG-2014508, upgrade to a patched version of OpenJDK that addresses this infinite loop flaw.
Users of OpenJDK, specifically version 17, implementing HTTPS server functionality are affected by REDHAT-BUG-2014508.
REDHAT-BUG-2014508 is exploitable remotely, allowing attackers to cause denial of service effects.
REDHAT-BUG-2014508 was reported as a vulnerability in October 2021.