First published: Mon Feb 11 2019(Updated: )
In Eclipse OpenJ9, prior to the 0.12.0 release, the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter. This affects existing APIs that called the functions to exceed the allocated buffer. This functions were not directly callable by non-native user code.
Credit: emo@eclipse.org
Affected Software | Affected Version | How to fix |
---|---|---|
Eclipse Openj9 | <0.12.0 | |
Redhat Satellite | =5.8 | |
Redhat Enterprise Linux Desktop | =6.0 | |
Redhat Enterprise Linux Desktop | =7.0 | |
Redhat Enterprise Linux Server | =6.0 | |
Redhat Enterprise Linux Server | =7.0 | |
Redhat Enterprise Linux Workstation | =6.0 | |
Redhat Enterprise Linux Workstation | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-12547 is a vulnerability in Eclipse OpenJ9 prior to the 0.12.0 release, where the jio_snprintf() and jio_vsnprintf() native methods ignored the length parameter.
CVE-2018-12547 has a severity rating of 9.8 (Critical).
CVE-2018-12547 affects Eclipse OpenJ9 up to version 0.12.0, Redhat Satellite version 5.8, and Redhat Enterprise Linux versions 6.0 and 7.0.
CVE-2018-12547 affects existing APIs that called the jio_snprintf() and jio_vsnprintf() functions to exceed the allocated buffer.
To fix CVE-2018-12547, update to Eclipse OpenJ9 version 0.12.0 or later.