First published: Sun Feb 14 2021(Updated: )
IBM JDK 7 SR10 FP80 (7.0.10.80), 7.1 SR4 FP80 (7.1.4.80), 8 SR6 FP25 (8.0.6.25), and 11 SR10 (11.0.10.0) fix a flaw described by upstream as: Eclipse OpenJ9 is vulnerable to a stack-based buffer overflow when the virtual machine or JNI natives are converting from UTF-8 characters to platform encoding. By sending an overly long string, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. References: <a href="https://www.ibm.com/support/pages/node/6414721">https://www.ibm.com/support/pages/node/6414721</a> <a href="https://www.ibm.com/support/pages/java-sdk-security-vulnerabilities#IBM_Security_Update_February_2021">https://www.ibm.com/support/pages/java-sdk-security-vulnerabilities#IBM_Security_Update_February_2021</a> <a href="https://bugs.eclipse.org/bugs/show_bug.cgi?id=569763">https://bugs.eclipse.org/bugs/show_bug.cgi?id=569763</a>
Affected Software | Affected Version | How to fix |
---|---|---|
IBM JDK 8 | ||
Eclipse Openj9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1928555 is considered high due to the potential for a stack-based buffer overflow.
To fix REDHAT-BUG-1928555, you should update your IBM JDK or Eclipse OpenJ9 to the latest patched versions provided by IBM.
Affected versions of REDHAT-BUG-1928555 include IBM JDK 7 SR10 FP80, 7.1 SR4 FP80, 8 SR6 FP25, and 11 SR10, as well as Eclipse OpenJ9.
REDHAT-BUG-1928555 is classified as a stack-based buffer overflow vulnerability.
Organizations using affected versions of IBM JDK or Eclipse OpenJ9 must address REDHAT-BUG-1928555 to ensure their systems are secure.