Bug 2221642 (CVE-2023-22044) - CVE-2023-22044 OpenJDK: modulo operator array indexing issue (8304460)
Summary: CVE-2023-22044 OpenJDK: modulo operator array indexing issue (8304460)
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2023-22044
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Nobody
QA Contact:
URL:
Whiteboard:
Depends On: 2221127 2221128 2221129 2221130 2221131 2221132 2221133 2224350
Blocks: 2221090
TreeView+ depends on / blocked
 
Reported: 2023-07-10 13:19 UTC by Mauro Matteo Cascella
Modified: 2024-05-16 11:35 UTC (History)
19 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2023-08-07 14:09:54 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:4159 0 None None None 2023-07-20 12:17:42 UTC
Red Hat Product Errata RHSA-2023:4169 0 None None None 2023-07-19 17:24:00 UTC
Red Hat Product Errata RHSA-2023:4170 0 None None None 2023-07-19 17:14:41 UTC
Red Hat Product Errata RHSA-2023:4171 0 None None None 2023-07-19 17:17:52 UTC
Red Hat Product Errata RHSA-2023:4177 0 None None None 2023-07-20 12:13:55 UTC
Red Hat Product Errata RHSA-2023:4210 0 None None None 2023-07-20 12:12:07 UTC
Red Hat Product Errata RHSA-2023:4211 0 None None None 2023-07-20 12:12:15 UTC

Description Mauro Matteo Cascella 2023-07-10 13:19:55 UTC
A flaw was found in the way the Hotspot component of OpenJDK handled array accesses using the binary % operator. This flaw could lead to an access at an invalid array position, leading to an out-of-bounds read vulnerability.

Comment 2 errata-xmlrpc 2023-07-19 17:14:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:4170 https://access.redhat.com/errata/RHSA-2023:4170

Comment 3 errata-xmlrpc 2023-07-19 17:17:50 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2023:4171 https://access.redhat.com/errata/RHSA-2023:4171

Comment 4 errata-xmlrpc 2023-07-19 17:23:58 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2023:4169 https://access.redhat.com/errata/RHSA-2023:4169

Comment 5 errata-xmlrpc 2023-07-20 12:12:05 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 17.0.8

Via RHSA-2023:4210 https://access.redhat.com/errata/RHSA-2023:4210

Comment 6 errata-xmlrpc 2023-07-20 12:12:13 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 17.0.8

Via RHSA-2023:4211 https://access.redhat.com/errata/RHSA-2023:4211

Comment 7 errata-xmlrpc 2023-07-20 12:13:54 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:4177 https://access.redhat.com/errata/RHSA-2023:4177

Comment 8 errata-xmlrpc 2023-07-20 12:17:40 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:4159 https://access.redhat.com/errata/RHSA-2023:4159

Comment 9 Product Security DevOps Team 2023-08-07 14:09:51 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2023-22044

Comment 10 Mauro Matteo Cascella 2023-08-11 10:12:07 UTC
OpenJDK-17 upstream commit:
https://github.com/openjdk/jdk17u/commit/811f3a16ec4d4054b9b78e5764573bb1f6b5ebb5


Note You need to log in before you can comment on or make changes to this bug.