First published: Sun Apr 14 2024(Updated: )
A flaw was found in the C2 compiler in the Hotspot component of OpenJDK. C2 compilation fails with "Exceeded _node_regs array" due to an improper size validation and out-of-bounds array access, potentially resulting in a corruption of the JVM memory. Upstream OpenJDK issue: <a href="https://bugs.openjdk.org/browse/JDK-8317507">https://bugs.openjdk.org/browse/JDK-8317507</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Build of OpenJDK with Hotspot |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2275005 is classified as critical due to potential memory corruption in the JVM.
To fix REDHAT-BUG-2275005, apply the latest patch provided by Red Hat for the affected OpenJDK version.
REDHAT-BUG-2275005 affects versions of the OpenJDK Hotspot component that utilize the C2 compiler.
REDHAT-BUG-2275005 is a memory corruption vulnerability caused by improper size validation in the C2 compiler.
If exploited, REDHAT-BUG-2275005 can lead to system instability and potential unauthorized access due to JVM memory corruption.