Subject: | |
From: | |
Reply To: | |
Date: | Thu, 27 Feb 2020 20:37:44 -0000 |
Content-Type: | text/plain |
Parts/Attachments: |
|
|
Synopsis: Important: java-1.7.0-openjdk security update
Advisory ID: SLSA-2020:0632-1
Issue Date: 2020-02-27
CVE Numbers: CVE-2020-2583
CVE-2020-2590
CVE-2020-2601
CVE-2020-2593
CVE-2020-2604
CVE-2020-2654
CVE-2020-2659
--
Security Fix(es):
* OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security,
8229951) (CVE-2020-2601)
* OpenJDK: Serialization filter changes via jdk.serialFilter property
modification (Serialization, 8231422) (CVE-2020-2604)
* OpenJDK: Improper checks of SASL message properties in GssKrb5Base
(Security, 8226352) (CVE-2020-2590)
* OpenJDK: Incorrect isBuiltinStreamHandler check causing URL
normalization issues (Networking, 8228548) (CVE-2020-2593)
* OpenJDK: Excessive memory usage in OID processing in X.509 certificate
parsing (Libraries, 8234037) (CVE-2020-2654)
* OpenJDK: Incorrect exception processing during deserialization in
BeanContextSupport (Serialization, 8224909) (CVE-2020-2583)
* OpenJDK: Incomplete enforcement of maxDatagramSockets limit in
DatagramChannelImpl (Networking, 8231795) (CVE-2020-2659)
--
SL6
x86_64
java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el6_10.x86_64.rpm
java-1.7.0-openjdk-debuginfo-1.7.0.251-2.6.21.0.el6_10.x86_64.rpm
java-1.7.0-openjdk-devel-1.7.0.251-2.6.21.0.el6_10.x86_64.rpm
java-1.7.0-openjdk-demo-1.7.0.251-2.6.21.0.el6_10.x86_64.rpm
java-1.7.0-openjdk-src-1.7.0.251-2.6.21.0.el6_10.x86_64.rpm
i386
java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el6_10.i686.rpm
java-1.7.0-openjdk-debuginfo-1.7.0.251-2.6.21.0.el6_10.i686.rpm
java-1.7.0-openjdk-devel-1.7.0.251-2.6.21.0.el6_10.i686.rpm
java-1.7.0-openjdk-demo-1.7.0.251-2.6.21.0.el6_10.i686.rpm
java-1.7.0-openjdk-src-1.7.0.251-2.6.21.0.el6_10.i686.rpm
noarch
java-1.7.0-openjdk-javadoc-1.7.0.251-2.6.21.0.el6_10.noarch.rpm
- Scientific Linux Development Team
|
|
|