Bug 1777929 (CVE-2019-2958) - CVE-2019-2958 OpenJDK: Incorrect escaping of command line arguments in ProcessImpl on Windows (Libraries, 8221858)
Summary: CVE-2019-2958 OpenJDK: Incorrect escaping of command line arguments in Proces...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2019-2958
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1753424
TreeView+ depends on / blocked
 
Reported: 2019-11-28 17:33 UTC by Tomas Hoger
Modified: 2019-12-02 21:39 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-11-28 19:04:53 UTC
Embargoed:


Attachments (Terms of Use)

Description Tomas Hoger 2019-11-28 17:33:20 UTC
It was discovered that the ProcessImpl class implementation for the Windows platform in the Libraries component of OpenJDK did not properly perform escaping of special characters in arguments for the command to be started.  This could possibly allow an attacker to cause an external process to be started with unexpected arguments.

This issue only affected OpenJDK for the Microsoft Windows platform.  Linux builds were not affected by this issue.

Comment 1 Tomas Hoger 2019-11-28 17:34:58 UTC
Public via Oracle CPU October 2019:

https://www.oracle.com/security-alerts/cpuoct2019.html#AppendixJAVA

Fixed in Oracle Java SE 13.0.1, 11.0.5, 8u231, and 7u241.

Comment 2 Product Security DevOps Team 2019-11-28 19:04:53 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-2958


Note You need to log in before you can comment on or make changes to this bug.