First published: Thu Jan 11 2024(Updated: )
A flaw was found in the loop optimizations performed by the Hotspot component of OpenJDK when generating range check predicates. An untrusted Java application or applet could use this flaw to corrupt JVM memory and cause it to crash or, possibly, execute arbitrary code, bypassing Java sandbox restrictions.
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Build of OpenJDK with Hotspot |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2257859 is critical due to the potential for arbitrary code execution.
To fix REDHAT-BUG-2257859, update to the latest version of OpenJDK Hotspot that includes the patch.
Not addressing REDHAT-BUG-2257859 may result in JVM memory corruption, application crashes, and possible security breaches.
REDHAT-BUG-2257859 affects multiple versions of OpenJDK Hotspot, particularly those prior to the designated patches.
Yes, REDHAT-BUG-2257859 can potentially be exploited remotely by untrusted Java applications or applets.