First published: Mon Jul 15 2024(Updated: )
Excessive symbol length can lead to an infinite loop vulnerability in OpenJDK. Oracle CPU advisory - July 2024: <a href="https://www.oracle.com/security-alerts/cpujul2024.html#AppendixJAVA">https://www.oracle.com/security-alerts/cpujul2024.html#AppendixJAVA</a>
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK 17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2297962 is considered high due to its potential to cause an infinite loop in OpenJDK.
To fix REDHAT-BUG-2297962, update your OpenJDK installation to the latest patched version provided by Oracle.
REDHAT-BUG-2297962 affects OpenJDK 17 and possibly other versions that utilize the same underlying code.
The vulnerability in REDHAT-BUG-2297962 is caused by excessive symbol length which can lead to an infinite loop in the parsing process.
Currently, no specific workarounds are recommended for REDHAT-BUG-2297962 aside from updating to a patched version.