MGASA-2020-0418

Source
https://advisories.mageia.org/MGASA-2020-0418.html
Import Source
https://advisories.mageia.org/MGASA-2020-0418.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2020-0418
Related
Published
2020-11-13T21:20:36Z
Modified
2020-11-16T22:57:26Z
Summary
Updated java-1.8.0-openjdk packages fix security vulnerabilities
Details

High memory usage during deserialization of Proxy class with many interfaces. (CVE-2020-14779)

Credentials sent over unencrypted LDAP connection. (CVE-2020-14781)

Certificate blacklist bypass via alternate certificate encodings. (CVE-2020-14782)

Integer overflow leading to out-of-bounds access. (CVE-2020-14792)

Missing permission check in path to URI conversion. (CVE-2020-14796)

Incomplete check for invalid characters in URI to path conversion. (CVE-2020-14797)

Race condition in NIO Buffer boundary checks. (CVE-2020-14803)

Also, the timezone package has been updated to version 2020d.

References
Credits

Affected packages

Mageia:7 / timezone

Package

Name
timezone
Purl
pkg:rpm/mageia/timezone?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2020d-1.mga7

Ecosystem specific

{
    "section": "core"
}

Mageia:7 / java-1.8.0-openjdk

Package

Name
java-1.8.0-openjdk
Purl
pkg:rpm/mageia/java-1.8.0-openjdk?distro=mageia-7

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.8.0.272-1.b10.1.mga7

Ecosystem specific

{
    "section": "core"
}