First published: Tue Apr 18 2023(Updated: )
It was discovered that the implementation of ProcesBuilder in the Libraries component of OpenJDK did not correctly process NULL characters in command name attributes. This could lead to manipulation of command arguments when executing processes with arguments from untrusted sources.
Affected Software | Affected Version | How to fix |
---|---|---|
OpenJDK 17 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2187758 is considered high due to its potential to manipulate command arguments from untrusted sources.
To fix REDHAT-BUG-2187758, you should upgrade to the latest patched version of OpenJDK.
REDHAT-BUG-2187758 affects implementations of OpenJDK, specifically OpenJDK 17.
The risks associated with REDHAT-BUG-2187758 include potential arbitrary command execution due to improper handling of NULL characters.
There is no official workaround for REDHAT-BUG-2187758; upgrading to a patched version is recommended.