Synopsis: Important: java-1.7.0-openjdk security update Advisory ID: SLSA-2020:0632-1 Issue Date: 2020-02-27 CVE Numbers: CVE-2020-2583 CVE-2020-2590 CVE-2020-2601 CVE-2020-2593 CVE-2020-2604 CVE-2020-2654 CVE-2020-2659 -- Security Fix(es): * OpenJDK: Use of unsafe RSA-MD5 checksum in Kerberos TGS (Security, 8229951) (CVE-2020-2601) * OpenJDK: Serialization filter changes via jdk.serialFilter property modification (Serialization, 8231422) (CVE-2020-2604) * OpenJDK: Improper checks of SASL message properties in GssKrb5Base (Security, 8226352) (CVE-2020-2590) * OpenJDK: Incorrect isBuiltinStreamHandler check causing URL normalization issues (Networking, 8228548) (CVE-2020-2593) * OpenJDK: Excessive memory usage in OID processing in X.509 certificate parsing (Libraries, 8234037) (CVE-2020-2654) * OpenJDK: Incorrect exception processing during deserialization in BeanContextSupport (Serialization, 8224909) (CVE-2020-2583) * OpenJDK: Incomplete enforcement of maxDatagramSockets limit in DatagramChannelImpl (Networking, 8231795) (CVE-2020-2659) -- SL6 x86_64 java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el6_10.x86_64.rpm java-1.7.0-openjdk-debuginfo-1.7.0.251-2.6.21.0.el6_10.x86_64.rpm java-1.7.0-openjdk-devel-1.7.0.251-2.6.21.0.el6_10.x86_64.rpm java-1.7.0-openjdk-demo-1.7.0.251-2.6.21.0.el6_10.x86_64.rpm java-1.7.0-openjdk-src-1.7.0.251-2.6.21.0.el6_10.x86_64.rpm i386 java-1.7.0-openjdk-1.7.0.251-2.6.21.0.el6_10.i686.rpm java-1.7.0-openjdk-debuginfo-1.7.0.251-2.6.21.0.el6_10.i686.rpm java-1.7.0-openjdk-devel-1.7.0.251-2.6.21.0.el6_10.i686.rpm java-1.7.0-openjdk-demo-1.7.0.251-2.6.21.0.el6_10.i686.rpm java-1.7.0-openjdk-src-1.7.0.251-2.6.21.0.el6_10.i686.rpm noarch java-1.7.0-openjdk-javadoc-1.7.0.251-2.6.21.0.el6_10.noarch.rpm - Scientific Linux Development Team