IBM JDK 7 SR10 FP80 (7.0.10.80), 7.1 SR4 FP80 (7.1.4.80), 8 SR6 FP25 (8.0.6.25), and 11 SR10 (11.0.10.0) fix a flaw described by upstream as: Eclipse OpenJ9 is vulnerable to a stack-based buffer overflow when the virtual machine or JNI natives are converting from UTF-8 characters to platform encoding. By sending an overly long string, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash. References: https://www.ibm.com/support/pages/node/6414721 https://www.ibm.com/support/pages/java-sdk-security-vulnerabilities#IBM_Security_Update_February_2021 https://bugs.eclipse.org/bugs/show_bug.cgi?id=569763
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Supplementary Via RHSA-2021:0717 https://access.redhat.com/errata/RHSA-2021:0717
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Supplementary Via RHSA-2021:0733 https://access.redhat.com/errata/RHSA-2021:0733
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:0736 https://access.redhat.com/errata/RHSA-2021:0736
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-27221