openSUSE: 2020:0757-1: important: java-11-openjdk

    Date 02 Jun 2020
    100
    Posted By LinuxSecurity Advisories
    An update that fixes 13 vulnerabilities is now available.
       openSUSE Security Update: Security update for java-11-openjdk
    ______________________________________________________________________________
    
    Announcement ID:    openSUSE-SU-2020:0757-1
    Rating:             important
    References:         #1167462 #1169511 
    Cross-References:   CVE-2020-2754 CVE-2020-2755 CVE-2020-2756
                        CVE-2020-2757 CVE-2020-2767 CVE-2020-2773
                        CVE-2020-2778 CVE-2020-2781 CVE-2020-2800
                        CVE-2020-2803 CVE-2020-2805 CVE-2020-2816
                        CVE-2020-2830
    Affected Products:
                        openSUSE Leap 15.1
    ______________________________________________________________________________
    
       An update that fixes 13 vulnerabilities is now available.
    
    Description:
    
       This update for java-11-openjdk fixes the following issues:
    
       Java was updated to jdk-11.0.7+10 (April 2020 CPU, bsc#1169511).
    
       Security issues fixed:
    
       - CVE-2020-2754: Fixed an incorrect handling of regular expressions that
         could have resulted in denial of service (bsc#1169511).
       - CVE-2020-2755: Fixed an incorrect handling of regular expressions that
         could have resulted in denial of service (bsc#1169511).
       - CVE-2020-2756: Fixed an incorrect handling of regular expressions that
         could have resulted in denial of service (bsc#1169511).
       - CVE-2020-2757: Fixed an object deserialization issue that could have
         resulted in denial of service via crafted serialized input (bsc#1169511).
       - CVE-2020-2767: Fixed an incorrect handling of certificate messages
         during TLS handshakes (bsc#1169511).
       - CVE-2020-2773: Fixed the incorrect handling of exceptions thrown by
         unmarshalKeyInfo() and unmarshalXMLSignature() (bsc#1169511).
       - CVE-2020-2778: Fixed the incorrect handling of SSLParameters in
         setAlgorithmConstraints(), which could have been abused to override the
         defined systems security policy and lead to the use of weak crypto
         algorithms (bsc#1169511).
       - CVE-2020-2781: Fixed the incorrect re-use of single null TLS sessions
         (bsc#1169511).
       - CVE-2020-2800: Fixed an HTTP header injection issue caused by
         mishandling of CR/LF in header values (bsc#1169511).
       - CVE-2020-2803: Fixed a boundary check and type check issue that could
         have led to a sandbox bypass (bsc#1169511).
       - CVE-2020-2805: Fixed a boundary check and type check issue that could
         have led to a sandbox bypass (bsc#1169511).
       - CVE-2020-2816: Fixed an incorrect handling of application data packets
         during TLS handshakes  (bsc#1169511).
       - CVE-2020-2830: Fixed an incorrect handling of regular expressions that
         could have resulted in denial of service (bsc#1169511).
    
       This update was imported from the SUSE:SLE-15:Update update project.
    
    
    Patch Instructions:
    
       To install this openSUSE Security Update use the SUSE recommended installation methods
       like YaST online_update or "zypper patch".
    
       Alternatively you can run the command listed for your product:
    
       - openSUSE Leap 15.1:
    
          zypper in -t patch openSUSE-2020-757=1
    
    
    
    Package List:
    
       - openSUSE Leap 15.1 (i586 x86_64):
    
          java-11-openjdk-11.0.7.0-lp151.3.16.1
          java-11-openjdk-accessibility-11.0.7.0-lp151.3.16.1
          java-11-openjdk-accessibility-debuginfo-11.0.7.0-lp151.3.16.1
          java-11-openjdk-debuginfo-11.0.7.0-lp151.3.16.1
          java-11-openjdk-debugsource-11.0.7.0-lp151.3.16.1
          java-11-openjdk-demo-11.0.7.0-lp151.3.16.1
          java-11-openjdk-devel-11.0.7.0-lp151.3.16.1
          java-11-openjdk-headless-11.0.7.0-lp151.3.16.1
          java-11-openjdk-jmods-11.0.7.0-lp151.3.16.1
          java-11-openjdk-src-11.0.7.0-lp151.3.16.1
    
       - openSUSE Leap 15.1 (noarch):
    
          java-11-openjdk-javadoc-11.0.7.0-lp151.3.16.1
    
    
    References:
    
       https://www.suse.com/security/cve/CVE-2020-2754.html
       https://www.suse.com/security/cve/CVE-2020-2755.html
       https://www.suse.com/security/cve/CVE-2020-2756.html
       https://www.suse.com/security/cve/CVE-2020-2757.html
       https://www.suse.com/security/cve/CVE-2020-2767.html
       https://www.suse.com/security/cve/CVE-2020-2773.html
       https://www.suse.com/security/cve/CVE-2020-2778.html
       https://www.suse.com/security/cve/CVE-2020-2781.html
       https://www.suse.com/security/cve/CVE-2020-2800.html
       https://www.suse.com/security/cve/CVE-2020-2803.html
       https://www.suse.com/security/cve/CVE-2020-2805.html
       https://www.suse.com/security/cve/CVE-2020-2816.html
       https://www.suse.com/security/cve/CVE-2020-2830.html
       https://bugzilla.suse.com/1167462
       https://bugzilla.suse.com/1169511
    
    -- 
    

    LinuxSecurity Poll

    How do you feel about the elimination of the terms 'blacklist' and 'slave' from the Linux kernel?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/32-how-do-you-feel-about-the-elimination-of-the-terms-blacklist-and-slave-from-the-linux-kernel?task=poll.vote&format=json
    32
    radio
    [{"id":"112","title":"I strongly support this change - racially charged language should not be used in the code and documentation of the kernel and other open-source projects.","votes":"7","type":"x","order":"1","pct":18.42,"resources":[]},{"id":"113","title":"I'm indifferent - this small change will not affect broader issues of racial insensitivity and white privilege.","votes":"4","type":"x","order":"2","pct":10.53,"resources":[]},{"id":"114","title":"I'm opposed to this change - there is no need to change language that has been used for years. It doesn't make sense for people to take offense to terminology used in community projects.","votes":"27","type":"x","order":"3","pct":71.05,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.