Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 146377 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.883386
Kategorie:CentOS Local Security Checks
Titel:CentOS: Security Advisory for java-11-openjdk (CESA-2021:3892)
Zusammenfassung:The remote host is missing an update for the 'java-11-openjdk'; package(s) announced via the CESA-2021:3892 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'java-11-openjdk'
package(s) announced via the CESA-2021:3892 advisory.

Vulnerability Insight:
The java-11-openjdk packages provide the OpenJDK 11 Java Runtime
Environment and the OpenJDK 11 Java Software Development Kit.

Security Fix(es):

* OpenJDK: Loop in HttpsServer triggered during TLS session close (JSSE,
8254967) (CVE-2021-35565)

* OpenJDK: Incorrect principal selection when using Kerberos Constrained
Delegation (Libraries, 8266689) (CVE-2021-35567)

* OpenJDK: Weak ciphers preferred over stronger ones for TLS (JSSE,
8264210) (CVE-2021-35550)

* OpenJDK: Excessive memory allocation in RTFParser (Swing, 8265167)
(CVE-2021-35556)

* OpenJDK: Excessive memory allocation in RTFReader (Swing, 8265580)
(CVE-2021-35559)

* OpenJDK: Excessive memory allocation in HashMap and HashSet (Utility,
8266097) (CVE-2021-35561)

* OpenJDK: Certificates with end dates too far in the future can corrupt
keystore (Keytool, 8266137) (CVE-2021-35564)

* OpenJDK: Unexpected exception raised during TLS handshake (JSSE, 8267729)
(CVE-2021-35578)

* OpenJDK: Excessive memory allocation in BMPImageReader (ImageIO, 8267735)
(CVE-2021-35586)

* OpenJDK: Non-constant comparison during TLS handshakes (JSSE, 8269618)
(CVE-2021-35603)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

Bug Fix(es):

* Previously, uninstalling the OpenJDK RPMs attempted to remove a client
directory that did not exist. This directory is no longer used in
java-11-openjdk and all references to it have now been removed.
(RHBZ#1698873)

Affected Software/OS:
'java-11-openjdk' package(s) on CentOS 7.

Solution:
Please install the updated package(s).

CVSS Score:
7.1

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:N/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2021-35550
Debian Security Information: DSA-5000 (Google Search)
https://www.debian.org/security/2021/dsa-5000
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GXTUWAWXVU37GRNIG4TPMA47THO6VAE6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6EUURAQOIJYFZHQ7DFZCO6IKDPIAWTNK/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7WTVCIVHTX3XONYOEGUMLKCM4QEC6INT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GTYZWIXDFUV2H57YQZJWPOD3BC3I3EIQ/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/V362B2BWTH5IJDL45QPQGMBKIQOG7JX5/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DJILEHYV2U37HKMGFEQ7CAVOV4DUWW2O/
https://security.gentoo.org/glsa/202209-05
https://www.oracle.com/security-alerts/cpuoct2021.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00008.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-35556
Debian Security Information: DSA-5012 (Google Search)
https://www.debian.org/security/2021/dsa-5012
Common Vulnerability Exposure (CVE) ID: CVE-2021-35559
Common Vulnerability Exposure (CVE) ID: CVE-2021-35561
Common Vulnerability Exposure (CVE) ID: CVE-2021-35564
Common Vulnerability Exposure (CVE) ID: CVE-2021-35565
Common Vulnerability Exposure (CVE) ID: CVE-2021-35567
Common Vulnerability Exposure (CVE) ID: CVE-2021-35578
Common Vulnerability Exposure (CVE) ID: CVE-2021-35586
Common Vulnerability Exposure (CVE) ID: CVE-2021-35603
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

Dies ist nur einer von 146377 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.