Bug 1777929 (CVE-2019-2958)

Summary: CVE-2019-2958 OpenJDK: Incorrect escaping of command line arguments in ProcessImpl on Windows (Libraries, 8221858)
Product: [Other] Security Response Reporter: Tomas Hoger <thoger>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: ahughes, bkearney, dbhole, java-qa, jvanek, tlestach
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-11-28 19:04:53 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On:    
Bug Blocks: 1753424    

Description Tomas Hoger 2019-11-28 17:33:20 UTC
It was discovered that the ProcessImpl class implementation for the Windows platform in the Libraries component of OpenJDK did not properly perform escaping of special characters in arguments for the command to be started.  This could possibly allow an attacker to cause an external process to be started with unexpected arguments.

This issue only affected OpenJDK for the Microsoft Windows platform.  Linux builds were not affected by this issue.

Comment 1 Tomas Hoger 2019-11-28 17:34:58 UTC
Public via Oracle CPU October 2019:

https://www.oracle.com/security-alerts/cpuoct2019.html#AppendixJAVA

Fixed in Oracle Java SE 13.0.1, 11.0.5, 8u231, and 7u241.

Comment 2 Product Security DevOps Team 2019-11-28 19:04:53 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-2958