First published: Sun Apr 14 2024(Updated: )
It was found that the ConnectionPool class implementation in the Networking/HTTP client component of OpenJDK improperly performs a reverse DNS query if the passed argument is an IP address, potentially sending a request over the wrong connection under certain conditions.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK 17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2274975 is critical due to the potential exposure to incorrect connection handling.
To fix REDHAT-BUG-2274975, you should update to the latest patch of OpenJDK as indicated in the security advisory.
REDHAT-BUG-2274975 affects OpenJDK 17 as identified in the vulnerability description.
The potential risks of REDHAT-BUG-2274975 include incorrect connection routing which could lead to data exposure or interception.
As of now, there are no known exploits for REDHAT-BUG-2274975, but it is recommended to address the vulnerability promptly.