Synopsis:          Important: java-11-openjdk security update
Advisory ID:       SLSA-2019:3127-1
Issue Date:        2019-10-16
CVE Numbers:       None
--

Security Fix(es):

* OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos,
8220302) (CVE-2019-2949)

* OpenJDK: Unexpected exception thrown during regular expression processing
in Nashorn (Scripting, 8223518) (CVE-2019-2975)

* OpenJDK: Out of bounds access in optimized String indexof implementation
(Hotspot, 8224062) (CVE-2019-2977)

* OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler
(Networking, 8223892) (CVE-2019-2978)

* OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection
(Networking, 8225298) (CVE-2019-2989)

* OpenJDK: Missing restrictions on use of custom SocketImpl (Networking,
8218573) (CVE-2019-2945)

* OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690)
(CVE-2019-2962)

* OpenJDK: Unexpected exception thrown by Pattern processing crafted
regular expression (Concurrency, 8222684) (CVE-2019-2964)

* OpenJDK: Unexpected exception thrown by XPathParser processing crafted
XPath expression (JAXP, 8223505) (CVE-2019-2973)

* OpenJDK: Unexpected exception thrown by XPath processing crafted XPath
expression (JAXP, 8224532) (CVE-2019-2981)

* OpenJDK: Unexpected exception thrown during Font object deserialization
(Serialization, 8224915) (CVE-2019-2983)

* OpenJDK: Missing glyph bitmap image dimension check in FreetypeFontScaler
(2D, 8225286) (CVE-2019-2987)

* OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292)
(CVE-2019-2988)

* OpenJDK: Excessive memory allocation in CMap when reading TrueType font
(2D, 8225597) (CVE-2019-2992)

* OpenJDK: Insufficient filtering of HTML event attributes in Javadoc
(Javadoc, 8226765) (CVE-2019-2999)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
--

SL7
  x86_64
    java-11-openjdk-11.0.5.10-0.el7_7.i686.rpm
    java-11-openjdk-11.0.5.10-0.el7_7.x86_64.rpm
    java-11-openjdk-debuginfo-11.0.5.10-0.el7_7.i686.rpm
    java-11-openjdk-debuginfo-11.0.5.10-0.el7_7.x86_64.rpm
    java-11-openjdk-headless-11.0.5.10-0.el7_7.i686.rpm
    java-11-openjdk-headless-11.0.5.10-0.el7_7.x86_64.rpm
    java-11-openjdk-debug-11.0.5.10-0.el7_7.i686.rpm
    java-11-openjdk-debug-11.0.5.10-0.el7_7.x86_64.rpm
    java-11-openjdk-demo-11.0.5.10-0.el7_7.i686.rpm
    java-11-openjdk-demo-11.0.5.10-0.el7_7.x86_64.rpm
    java-11-openjdk-demo-debug-11.0.5.10-0.el7_7.i686.rpm
    java-11-openjdk-demo-debug-11.0.5.10-0.el7_7.x86_64.rpm
    java-11-openjdk-devel-11.0.5.10-0.el7_7.i686.rpm
    java-11-openjdk-devel-11.0.5.10-0.el7_7.x86_64.rpm
    java-11-openjdk-devel-debug-11.0.5.10-0.el7_7.i686.rpm
    java-11-openjdk-devel-debug-11.0.5.10-0.el7_7.x86_64.rpm
    java-11-openjdk-headless-debug-11.0.5.10-0.el7_7.i686.rpm
    java-11-openjdk-headless-debug-11.0.5.10-0.el7_7.x86_64.rpm
    java-11-openjdk-javadoc-11.0.5.10-0.el7_7.i686.rpm
    java-11-openjdk-javadoc-11.0.5.10-0.el7_7.x86_64.rpm
    java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7.i686.rpm
    java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7.x86_64.rpm
    java-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7.i686.rpm
    java-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7.x86_64.rpm
    java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7.i686.rpm
    java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7.x86_64.rpm
    java-11-openjdk-jmods-11.0.5.10-0.el7_7.i686.rpm
    java-11-openjdk-jmods-11.0.5.10-0.el7_7.x86_64.rpm
    java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7.i686.rpm
    java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7.x86_64.rpm
    java-11-openjdk-src-11.0.5.10-0.el7_7.i686.rpm
    java-11-openjdk-src-11.0.5.10-0.el7_7.x86_64.rpm
    java-11-openjdk-src-debug-11.0.5.10-0.el7_7.i686.rpm
    java-11-openjdk-src-debug-11.0.5.10-0.el7_7.x86_64.rpm

- Scientific Linux Development Team

SciLinux: SLSA-2019-3127-1 Important: java-11-openjdk on SL7.x x86_64

OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos, 8220302) (CVE-2019-2949) * OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn ...

Summary

Important: java-11-openjdk security update



Security Fixes

* OpenJDK: Improper handling of Kerberos proxy credentials (Kerberos, 8220302) (CVE-2019-2949)
* OpenJDK: Unexpected exception thrown during regular expression processing in Nashorn (Scripting, 8223518) (CVE-2019-2975)
* OpenJDK: Out of bounds access in optimized String indexof implementation (Hotspot, 8224062) (CVE-2019-2977)
* OpenJDK: Incorrect handling of nested jar: URLs in Jar URL handler (Networking, 8223892) (CVE-2019-2978)
* OpenJDK: Incorrect handling of HTTP proxy responses in HttpURLConnection (Networking, 8225298) (CVE-2019-2989)
* OpenJDK: Missing restrictions on use of custom SocketImpl (Networking, 8218573) (CVE-2019-2945)
* OpenJDK: NULL pointer dereference in DrawGlyphList (2D, 8222690) (CVE-2019-2962)
* OpenJDK: Unexpected exception thrown by Pattern processing crafted regular expression (Concurrency, 8222684) (CVE-2019-2964)
* OpenJDK: Unexpected exception thrown by XPathParser processing crafted XPath expression (JAXP, 8223505) (CVE-2019-2973)
* OpenJDK: Unexpected exception thrown by XPath processing crafted XPath expression (JAXP, 8224532) (CVE-2019-2981)
* OpenJDK: Unexpected exception thrown during Font object deserialization (Serialization, 8224915) (CVE-2019-2983)
* OpenJDK: Missing glyph bitmap image dimension check in FreetypeFontScaler (2D, 8225286) (CVE-2019-2987)
* OpenJDK: Integer overflow in bounds check in SunGraphics2D (2D, 8225292) (CVE-2019-2988)
* OpenJDK: Excessive memory allocation in CMap when reading TrueType font (2D, 8225597) (CVE-2019-2992)
* OpenJDK: Insufficient filtering of HTML event attributes in Javadoc (Javadoc, 8226765) (CVE-2019-2999)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
SL7 x86_64 java-11-openjdk-11.0.5.10-0.el7_7.i686.rpm java-11-openjdk-11.0.5.10-0.el7_7.x86_64.rpm java-11-openjdk-debuginfo-11.0.5.10-0.el7_7.i686.rpm java-11-openjdk-debuginfo-11.0.5.10-0.el7_7.x86_64.rpm java-11-openjdk-headless-11.0.5.10-0.el7_7.i686.rpm java-11-openjdk-headless-11.0.5.10-0.el7_7.x86_64.rpm java-11-openjdk-debug-11.0.5.10-0.el7_7.i686.rpm java-11-openjdk-debug-11.0.5.10-0.el7_7.x86_64.rpm java-11-openjdk-demo-11.0.5.10-0.el7_7.i686.rpm java-11-openjdk-demo-11.0.5.10-0.el7_7.x86_64.rpm java-11-openjdk-demo-debug-11.0.5.10-0.el7_7.i686.rpm java-11-openjdk-demo-debug-11.0.5.10-0.el7_7.x86_64.rpm java-11-openjdk-devel-11.0.5.10-0.el7_7.i686.rpm java-11-openjdk-devel-11.0.5.10-0.el7_7.x86_64.rpm java-11-openjdk-devel-debug-11.0.5.10-0.el7_7.i686.rpm java-11-openjdk-devel-debug-11.0.5.10-0.el7_7.x86_64.rpm java-11-openjdk-headless-debug-11.0.5.10-0.el7_7.i686.rpm java-11-openjdk-headless-debug-11.0.5.10-0.el7_7.x86_64.rpm java-11-openjdk-javadoc-11.0.5.10-0.el7_7.i686.rpm java-11-openjdk-javadoc-11.0.5.10-0.el7_7.x86_64.rpm java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7.i686.rpm java-11-openjdk-javadoc-debug-11.0.5.10-0.el7_7.x86_64.rpm java-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7.i686.rpm java-11-openjdk-javadoc-zip-11.0.5.10-0.el7_7.x86_64.rpm java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7.i686.rpm java-11-openjdk-javadoc-zip-debug-11.0.5.10-0.el7_7.x86_64.rpm java-11-openjdk-jmods-11.0.5.10-0.el7_7.i686.rpm java-11-openjdk-jmods-11.0.5.10-0.el7_7.x86_64.rpm java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7.i686.rpm java-11-openjdk-jmods-debug-11.0.5.10-0.el7_7.x86_64.rpm java-11-openjdk-src-11.0.5.10-0.el7_7.i686.rpm java-11-openjdk-src-11.0.5.10-0.el7_7.x86_64.rpm java-11-openjdk-src-debug-11.0.5.10-0.el7_7.i686.rpm java-11-openjdk-src-debug-11.0.5.10-0.el7_7.x86_64.rpm
- Scientific Linux Development Team

Severity
Advisory ID: SLSA-2019:3127-1
Issued Date: : 2019-10-16
CVE Numbers: None

Related News