Lucene search

K
altlinuxHttps://packages.altlinux.org/en/sisyphus/security/61DFA798756D99B65F1D96CC4A334918
HistoryAug 25, 2021 - 12:00 a.m.

Security fix for the ALT Linux 10 package java-11-openjdk version 0:11.0.12.7-alt1_0jpp10

2021-08-2500:00:00
https://packages.altlinux.org/en/sisyphus/security/
packages.altlinux.org
10

8.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

Aug. 25, 2021 Andrey Cherepanov 0:11.0.12.7-alt1_0jpp10

- new version
- security fixes:
  + CVE-2021-2341: Improve file transfers
  + CVE-2021-2369: Better jar file validation
  + CVE-2021-2388: Enhance compiler validation
  + CVE-2021-2161: Less ambiguous processing
  + CVE-2021-2163: Enhance opening JARs
  + CVE-2020-14779: Enhance support of Proxy class
  + CVE-2020-14781: Enhanced LDAP contexts
  + CVE-2020-14782: Enhance certificate processing
  + CVE-2020-14792: Better range handling
  + CVE-2020-14796: Improved URI Support
  + CVE-2020-14797: Better Path Validation
  + CVE-2020-14798: Enhanced buffer support
  + CVE-2020-14803: Improved Buffer supports
  + CVE-2020-14562: Enhance TIFF support
  + CVE-2020-14573: Enhance Graal interface handling
  + CVE-2020-14556: Better ForkJoinPool behavior
  + CVE-2020-14577: Enhance certificate verification
  + CVE-2020-14581: Better matrix operations
  + CVE-2020-14583: Better Buffer support
  + CVE-2020-14593: Less Affine Transformations
  + CVE-2020-14621: Better XML namespace handling
  + CVE-2020-2754: Forward references to Nashorn
  + CVE-2020-2755: Improve Nashorn matching
  + CVE-2020-2756: Better mapping of serial ENUMs
  + CVE-2020-2757: Less Blocking Array Queues
  + CVE-2020-2773: Better signatures in XML
  + CVE-2020-2778: More constrained algorithms
  + CVE-2020-2767: Improve TLS verification
  + CVE-2020-2781: Improve TLS session handling
  + CVE-2020-2800: Better Headings for HTTP Servers
  + CVE-2020-2803: Enhance buffering of byte buffers
  + CVE-2020-2805: Enhance typing of methods
  + CVE-2020-2816: Enhance TLS connectivity
  + CVE-2020-2830: Better Scanner conversions
  + CVE-2020-2583: Unlink Set of LinkedHashSets
  + CVE-2020-2590: Improve Kerberos interop capabilities
  + CVE-2020-2593: Normalize normalization for all
  + CVE-2020-2601: Better Ticket Granting Services
  + CVE-2020-2604: Better serial filter handling
  + CVE-2020-2655: Better TLS messaging support
  + CVE-2020-2654: Improve Object Identifier Processing
  + CVE-2019-2933: Windows file handling redux
  + CVE-2019-2945: Better socket support
  + CVE-2019-2949: Better Kerberos ccache handling
  + CVE-2019-2958: Build Better Processes
  + CVE-2019-2964: Better support for patterns
  + CVE-2019-2962: Better Glyph Images
  + CVE-2019-2973: Better pattern compilation
  + CVE-2019-2975: Unexpected exception in jjs
  + CVE-2019-2978: Improved handling of jar files
  + CVE-2019-2977: Improve String index handling
  + CVE-2019-2981: Better Path supports
  + CVE-2019-2983: Better serial attributes
  + CVE-2019-2987: Better rendering of native glyphs
  + CVE-2019-2988: Better Graphics2D drawing
  + CVE-2019-2989: Improve TLS connection support
  + CVE-2019-2992: Enhance font glyph mapping
  + CVE-2019-2999: Commentary on Javadoc comments
  + CVE-2019-2894: Enhance ECDSA operations
  + CVE-2019-2762: Exceptional throw cases
  + CVE-2019-2766: Improve file protocol handling
  + CVE-2019-2769: Better copies of CopiesList
  + CVE-2019-2786: More limited privilege usage
  + CVE-2019-7317: Improve PNG support options
  + CVE-2019-2818: Better Poly1305 support
  + CVE-2019-2816: Normalize normalization
  + CVE-2019-2821: Improve TLS negotiation
  + CVE-2019-2602: Better String parsing
  + CVE-2019-2684: More dynamic RMI interactions
  + CVE-2019-2698: Fuzzing TrueType fonts: setCurrGlyphID()
OSVersionArchitecturePackageVersionFilename
ALT Linux10srcjava-11-openjdk-11.0.18.0.10-alt1_1jpp11.src.rpm< 0:11.0.12.7-alt1_0jpp10java-11-openjdk-11.0.18.0.10-alt1_1jpp11.src.rpm
ALT Linux10x86_64java-11-openjdk-11.0.18.0.10-alt1_1jpp11.x86_64.rpm< 0:11.0.12.7-alt1_0jpp10java-11-openjdk-11.0.18.0.10-alt1_1jpp11.x86_64.rpm
ALT Linux10x86_64java-11-openjdk-debuginfo-11.0.18.0.10-alt1_1jpp11.x86_64.rpm< 0:11.0.12.7-alt1_0jpp10java-11-openjdk-debuginfo-11.0.18.0.10-alt1_1jpp11.x86_64.rpm
ALT Linux10x86_64java-11-openjdk-demo-11.0.18.0.10-alt1_1jpp11.x86_64.rpm< 0:11.0.12.7-alt1_0jpp10java-11-openjdk-demo-11.0.18.0.10-alt1_1jpp11.x86_64.rpm
ALT Linux10x86_64java-11-openjdk-devel-11.0.18.0.10-alt1_1jpp11.x86_64.rpm< 0:11.0.12.7-alt1_0jpp10java-11-openjdk-devel-11.0.18.0.10-alt1_1jpp11.x86_64.rpm
ALT Linux10x86_64java-11-openjdk-devel-debuginfo-11.0.18.0.10-alt1_1jpp11.x86_64.rpm< 0:11.0.12.7-alt1_0jpp10java-11-openjdk-devel-debuginfo-11.0.18.0.10-alt1_1jpp11.x86_64.rpm
ALT Linux10x86_64java-11-openjdk-headless-11.0.18.0.10-alt1_1jpp11.x86_64.rpm< 0:11.0.12.7-alt1_0jpp10java-11-openjdk-headless-11.0.18.0.10-alt1_1jpp11.x86_64.rpm
ALT Linux10x86_64java-11-openjdk-headless-debuginfo-11.0.18.0.10-alt1_1jpp11.x86_64.rpm< 0:11.0.12.7-alt1_0jpp10java-11-openjdk-headless-debuginfo-11.0.18.0.10-alt1_1jpp11.x86_64.rpm
ALT Linux10x86_64java-11-openjdk-javadoc-11.0.18.0.10-alt1_1jpp11.x86_64.rpm< 0:11.0.12.7-alt1_0jpp10java-11-openjdk-javadoc-11.0.18.0.10-alt1_1jpp11.x86_64.rpm
ALT Linux10x86_64java-11-openjdk-javadoc-zip-11.0.18.0.10-alt1_1jpp11.x86_64.rpm< 0:11.0.12.7-alt1_0jpp10java-11-openjdk-javadoc-zip-11.0.18.0.10-alt1_1jpp11.x86_64.rpm
Rows per page:
1-10 of 631

8.3 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P