Bug 2133817 (CVE-2022-21618) - CVE-2022-21618 OpenJDK: improper MultiByte conversion can lead to buffer overflow (JGSS, 8286077)
Summary: CVE-2022-21618 OpenJDK: improper MultiByte conversion can lead to buffer over...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2022-21618
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2133718 2133721 2133727 2133730 2133712 2133713 2133714 2133715 2133716 2133717 2133719 2133720 2133722 2133723 2133724 2133725 2133726 2133728 2133729 2134564
Blocks: 2133694
TreeView+ depends on / blocked
 
Reported: 2022-10-11 13:48 UTC by Mauro Matteo Cascella
Modified: 2023-08-07 09:27 UTC (History)
22 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-11-30 12:15:44 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2022:6999 0 None None None 2022-10-20 08:06:11 UTC
Red Hat Product Errata RHSA-2022:7000 0 None None None 2022-10-19 22:38:35 UTC
Red Hat Product Errata RHSA-2022:7001 0 None None None 2022-10-19 22:24:24 UTC
Red Hat Product Errata RHSA-2022:7008 0 None None None 2022-10-19 22:30:50 UTC
Red Hat Product Errata RHSA-2022:7009 0 None None None 2022-10-19 21:12:05 UTC
Red Hat Product Errata RHSA-2022:7010 0 None None None 2022-10-19 22:29:59 UTC
Red Hat Product Errata RHSA-2022:7011 0 None None None 2022-10-19 22:26:05 UTC
Red Hat Product Errata RHSA-2022:7012 0 None None None 2022-10-19 22:35:26 UTC
Red Hat Product Errata RHSA-2022:7013 0 None None None 2022-10-20 08:05:03 UTC
Red Hat Product Errata RHSA-2022:7051 0 None None None 2022-10-20 10:26:47 UTC
Red Hat Product Errata RHSA-2022:7052 0 None None None 2022-10-20 10:19:15 UTC
Red Hat Product Errata RHSA-2022:7053 0 None None None 2022-10-20 10:28:31 UTC
Red Hat Product Errata RHSA-2022:7054 0 None None None 2022-10-20 10:20:46 UTC

Description Mauro Matteo Cascella 2022-10-11 13:48:08 UTC
A flaw was found in the JGSS component of OpenJDK. Improper MultiByte conversions (byte vs. character) could lead to a buffer overflow vulnerability.

Comment 15 Mauro Matteo Cascella 2022-10-19 15:10:10 UTC
Public now via Oracle CPU October 2022:

https://www.oracle.com/security-alerts/cpuoct2022.html#AppendixJAVA

Fixed in Oracle Java SE 17.0.5, 19.0.1.

Release notes:
https://www.oracle.com/java/technologies/javase/17-0-5-relnotes.html
https://www.oracle.com/java/technologies/javase/19-0-1-relnotes.html

Comment 16 errata-xmlrpc 2022-10-19 21:12:02 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2022:7009 https://access.redhat.com/errata/RHSA-2022:7009

Comment 17 errata-xmlrpc 2022-10-19 22:24:22 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2022:7001 https://access.redhat.com/errata/RHSA-2022:7001

Comment 18 errata-xmlrpc 2022-10-19 22:26:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2022:7011 https://access.redhat.com/errata/RHSA-2022:7011

Comment 19 errata-xmlrpc 2022-10-19 22:29:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Extended Update Support

Via RHSA-2022:7010 https://access.redhat.com/errata/RHSA-2022:7010

Comment 20 errata-xmlrpc 2022-10-19 22:30:46 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2022:7008 https://access.redhat.com/errata/RHSA-2022:7008

Comment 21 errata-xmlrpc 2022-10-19 22:35:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:7012 https://access.redhat.com/errata/RHSA-2022:7012

Comment 22 errata-xmlrpc 2022-10-19 22:38:32 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:7000 https://access.redhat.com/errata/RHSA-2022:7000

Comment 23 errata-xmlrpc 2022-10-20 08:05:00 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:7013 https://access.redhat.com/errata/RHSA-2022:7013

Comment 24 errata-xmlrpc 2022-10-20 08:06:08 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:6999 https://access.redhat.com/errata/RHSA-2022:6999

Comment 25 errata-xmlrpc 2022-10-20 10:19:13 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 11.0.17

Via RHSA-2022:7052 https://access.redhat.com/errata/RHSA-2022:7052

Comment 26 errata-xmlrpc 2022-10-20 10:20:43 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 11.0.17

Via RHSA-2022:7054 https://access.redhat.com/errata/RHSA-2022:7054

Comment 27 errata-xmlrpc 2022-10-20 10:26:44 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 17.0.5

Via RHSA-2022:7051 https://access.redhat.com/errata/RHSA-2022:7051

Comment 28 errata-xmlrpc 2022-10-20 10:28:29 UTC
This issue has been addressed in the following products:

  Red Hat Build of OpenJDK 17.0.5

Via RHSA-2022:7053 https://access.redhat.com/errata/RHSA-2022:7053

Comment 30 Product Security DevOps Team 2022-11-30 12:15:41 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-21618


Note You need to log in before you can comment on or make changes to this bug.