![]() |
Startseite ▼ Bookkeeping
Online ▼ Sicherheits
Überprüfungs ▼
Verwaltetes
DNS ▼
Info
Bestellen/Erneuern
FAQ
AUP
Dynamic DNS Clients
Domaine konfigurieren Dyanmic DNS Update Password Netzwerk
Überwachung ▼
Enterprise
Erweiterte
Standard
Gratis Test
FAQ
Preis/Funktionszusammenfassung
Bestellen
Beispiele
Konfigurieren/Status Alarm Profile | ||
Test Kennung: | 1.3.6.1.4.1.25623.1.0.883228 |
Kategorie: | CentOS Local Security Checks |
Titel: | CentOS: Security Advisory for java-11-openjdk (CESA-2020:1509) |
Zusammenfassung: | The remote host is missing an update for the 'java-11-openjdk'; package(s) announced via the CESA-2020:1509 advisory. |
Beschreibung: | Summary: The remote host is missing an update for the 'java-11-openjdk' package(s) announced via the CESA-2020:1509 advisory. Vulnerability Insight: The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit. Security Fix(es): * OpenJDK: Incorrect bounds checks in NIO Buffers (Libraries, 8234841) (CVE-2020-2803) * OpenJDK: Incorrect type checks in MethodType.readObject() (Libraries, 8235274) (CVE-2020-2805) * OpenJDK: Application data accepted before TLS handshake completion (JSSE, 8235691) (CVE-2020-2816) * OpenJDK: Incorrect handling of Certificate messages during TLS handshake (JSSE, 8232581) (CVE-2020-2767) * OpenJDK: Unexpected exceptions raised by DOMKeyInfoFactory and DOMXMLSignatureFactory (Security, 8231415) (CVE-2020-2773) * OpenJDK: Incomplete enforcement of algorithm restrictions for TLS (JSSE, 8232424) (CVE-2020-2778) * OpenJDK: Re-use of single TLS session for new connections (JSSE, 8234408) (CVE-2020-2781) * OpenJDK: CRLF injection into HTTP headers in HttpServer (Lightweight HTTP Server, 8234825) (CVE-2020-2800) * OpenJDK: Regular expression DoS in Scanner (Concurrency, 8236201) (CVE-2020-2830) * OpenJDK: Misplaced regular expression syntax error check in RegExpScanner (Scripting, 8223898) (CVE-2020-2754) * OpenJDK: Incorrect handling of empty string nodes in regular expression Parser (Scripting, 8223904) (CVE-2020-2755) * OpenJDK: Incorrect handling of references to uninitialized class descriptors during deserialization (Serialization, 8224541) (CVE-2020-2756) * OpenJDK: Uncaught InstantiationError exception in ObjectStreamClass (Serialization, 8224549) (CVE-2020-2757) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Affected Software/OS: 'java-11-openjdk' package(s) on CentOS 7. Solution: Please install the updated package(s). CVSS Score: 5.8 CVSS Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N |
Querverweis: |
Common Vulnerability Exposure (CVE) ID: CVE-2020-2754 Debian Security Information: DSA-4662 (Google Search) https://www.debian.org/security/2020/dsa-4662 Debian Security Information: DSA-4668 (Google Search) https://www.debian.org/security/2020/dsa-4668 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CKAV6KFFAEANXAN73AFTGU7Z6YNRWCXQ/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L7VHC4EW36KZEIDQ56RPCWBZCQELFFKN/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NYHHHZRHXCBGRHGE5UP7UEB4IZ2QX536/ https://www.oracle.com/security-alerts/cpuapr2020.html SuSE Security Announcement: openSUSE-SU-2020:0757 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00000.html SuSE Security Announcement: openSUSE-SU-2020:0800 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00023.html SuSE Security Announcement: openSUSE-SU-2020:0841 (Google Search) http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00048.html https://usn.ubuntu.com/4337-1/ Common Vulnerability Exposure (CVE) ID: CVE-2020-2755 https://security.gentoo.org/glsa/202006-22 https://security.gentoo.org/glsa/202209-15 Common Vulnerability Exposure (CVE) ID: CVE-2020-2756 https://lists.debian.org/debian-lts-announce/2020/04/msg00024.html Common Vulnerability Exposure (CVE) ID: CVE-2020-2757 Common Vulnerability Exposure (CVE) ID: CVE-2020-2767 Common Vulnerability Exposure (CVE) ID: CVE-2020-2773 Common Vulnerability Exposure (CVE) ID: CVE-2020-2778 Common Vulnerability Exposure (CVE) ID: CVE-2020-2781 Common Vulnerability Exposure (CVE) ID: CVE-2020-2800 Common Vulnerability Exposure (CVE) ID: CVE-2020-2803 Common Vulnerability Exposure (CVE) ID: CVE-2020-2805 Common Vulnerability Exposure (CVE) ID: CVE-2020-2816 Common Vulnerability Exposure (CVE) ID: CVE-2020-2830 |
Copyright | Copyright (C) 2020 Greenbone Networks GmbH |
Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus. Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten. |