MGASA-2020-0182

Source
https://advisories.mageia.org/MGASA-2020-0182.html
Import Source
https://advisories.mageia.org/MGASA-2020-0182.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2020-0182
Related
Published
2020-04-24T17:03:35Z
Modified
2020-04-24T16:36:48Z
Summary
Updated java-1.8.0-openjdk packages fix security vulnerabilities
Details

Updated java-1.8.0-openjdk packages fix security vulnerabilities:

Misplaced regular expression syntax error check in RegExpScanner (Scripting, 8223898) (CVE-2020-2754)

Incorrect handling of empty string nodes in regular expression Parser (Scripting, 8223904) (CVE-2020-2755)

Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) (CVE-2020-2756)

Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) (CVE-2020-2757)

Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) (CVE-2020-2773)

Re-use of single TLS session for new connections (JSSE, 8234408) (CVE-2020-2781)

CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) (CVE-2020-2800)

Incorrect bounds checks in NIO Buffers (Libraries, 8234841) (CVE-2020-2803)

Incorrect type checks in MethodType.readObject() (Libraries, 8235274) (CVE-2020-2805)

Regular expression DoS in Scanner (Concurrency, 8236201) (CVE-2020-2830)

References
Credits

Affected packages

Mageia:7 / java-1.8.0-openjdk

Package

Name
java-1.8.0-openjdk
Purl
pkg:rpm/mageia/java-1.8.0-openjdk?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.0.252-1.b09.1.mga7

Ecosystem specific

{
    "section": "core"
}